Please turn on your JavaScript for this page to function normally.
box
Rethink network security outside the box

Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. …

abstract
Hyperconverged infrastructure adoption is accelerating

The hyperconverged infrastructure is increasingly being adopted by enterprise and midmarket companies to reduce data center costs and improve operational efficiency, according …

traffic
Week in review: Smart TV ransomware, DNC hack, and DAO under attack

Here’s an overview of some of last week’s most interesting news and articles: Ransomware targets Android smart TVs If you own a Sharp and Philips smart TV running …

caution
50% of ads on free livestreaming websites are malicious

Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU …

threat hunting
How do you win the web security game when the rules keep changing?

Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly …

building blocks
Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …

airplane
Get ready for a surge in online travel fraud

Unsurprisingly, transactions for booking flights, hotels and rental cars increase significantly over the summer months. In addition, fraudulent activity against online travel …

CLTRe
Assess, build and improve security culture with CLTRe

Norwegian security startup CLTRe announced a new product series, enhancing its existing Saas offering, the Security Culture Toolkit. This new range consists of CLTRe Control, …

vote
Security implications of online voting

With essentially everything moving online, it would seem to be the natural progression that voting online or on your mobile device would be the next thing to happen. Not only …

dollar
The average cost of a data breach is now $4 million

The average data breach cost has grown to $4 million, representing a 29 percent increase since 2013, according to the Ponemon Institute. Cybersecurity incidents continue to …

Abstract
75% of organizations have serious cybersecurity risk exposure

Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …

IoT
Can you see and control IoT devices on your network?

While the majority of IT pros acknowledge the growing number of IoT devices on their networks, they are unaware of how to properly secure them, according to ForeScout. The …

Don't miss

Cybersecurity news