Please turn on your JavaScript for this page to function normally.
Users lock
The current state of privileged access management practices

There’s a widening gulf between organizations that adhere to best practices for privileged access management, according to BeyondTrust. Password and credential …

Pokémon GO
Essential Pokémon GO protection tips

Since its release, Pokémon GO has become the most downloaded game in history on iOS and Android. However, Gemalto is now warning its millions of players around the world to …

stats
Global mobile deep packet inspection market explodes

The global mobile deep packet inspection (DPI) market will grow at an impressive CAGR of almost 22% until 2020, according to Technavio. Stateful packet inspection Stateful …

Armor
Armor helps streamline HITRUST certification

As the healthcare industry continues to be a major cybercrime target, compliance has gained even more significance. HITRUST certification has emerged as the benchmark for …

biohazard
The evolution of BEC scams and ransomware

Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …

KPMG security
Consumers ready to walk away from their favorite retailers if a breach occurs

Consumers are wary of the increased frequency of cyber attacks against retailers, and many are ready to walk away from their favorite retailers if a breach occurs. In fact, in …

Europe
Cyber attacks: Hindsight is 20/20, GDPR is even better

The dust is beginning to settle on the EU referendum result. But, while the UK’s departure from the union is set to shake things up for many businesses nationwide, there’s at …

chip
Researchers design a chip that checks for sabotage

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

antenna
Cybercriminals select insiders to attack telecom providers

Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …

face
Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

linux tux
Linux kernel development: How fast it’s going and who is doing it

The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …

World target
Shadow Brokers, digital attacks, and the escalation of geopolitical conflict

Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often …

Don't miss

Cybersecurity news