Please turn on your JavaScript for this page to function normally.
phone call
LaunchKey: Passwordless consumer authentication at scale

iovation announced its LaunchKey mobile multifactor authentication solution. It empowers global consumer brands to improve security and consumer experience by delivering a …

DDoS
DDoS attacks increasingly form blended attacks of more vulnerabilities

DDoS attacks increasingly formed blended attacks of four or more vulnerabilities over the course of the fourth quarter of 2016, with an intent to overload targeted monitoring, …

data
Less than half of organizations trust their data for business decisions

Data is being used by businesses in more ways than ever before, but they still lack trust in their data. While data supports major business initiatives, the level of data …

strategy
Security practices need to evolve in order to handle complex threats

There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …

blocks
Soon, organizations will be valued on their information portfolios

By 2021, the prevalence of equity analysts valuing organizations’ information portfolios in valuing businesses themselves will spark formal internal information …

Sophos
Sophos acquires Invincea

Sophos has agreed to acquire Invincea from its current shareholders for a cash consideration of $100 million with a $20 million earn-out. Sophos will retain the company’s …

Phishing
Phishing trends: Who is targeted and why

The business model of phishing has evolved. The bad guys have found ways to multiply their profits at the expense of organizations they aren’t even attacking directly, …

Search
Monitoring scanning activities that could lead to IoT compromises

IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

phone call
Can smartphone thieves be identified in seconds?

Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under 14 seconds. “While most people …

AlienVault USM Anywhere
USM Anywhere simplifies security for organizations of all sizes

AlienVault announced the availability of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform designed to centralize threat detection, …

Absolute
Self-healing endpoint security as a foundation for visibility

When it comes to persistent cyber threats, a majority of companies have resigned themselves to the fact they will be or are already infiltrated by an unknown adversary. It is …

IoT
8.4 billion connected things will be in use worldwide in 2017

Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools