Please turn on your JavaScript for this page to function normally.
Bitcoin
Exploring trends in automated crypto trading

Despite the risks, many traders continue to be attracted to cryptocurrency trading due to the earning potential it offers. Sasha Ivanov, CEO of Waves, explains that the crypto …

RSAC
RSA Conference 2017 debuts education program

RSA Conference announced the debut of RSAC AdvancedU – a new series of programs to educate and encourage more people to pursue a career in cybersecurity and also invigorate …

risk
Mitigating internal risk: Three steps to educate employees

IT security is usually focused on how to prevent outsiders with malicious intent from causing harm to your IT systems and data. While this is a valid concern, people within …

city
Citizens will share personal data with smart city programs by 2019

The rapid pace of technological and societal change has given government CIOs a new sense of urgency and a willingness to experiment with smart city and open data initiatives, …

earth
Playing the blame game: Breaking down cybersecurity attribution

Attributing the adversary behind a cyber attack ranks as perhaps the hardest challenge in all of cyber security, well beyond securing networks from intrusions, for the simple …

fire
Highly lucrative Ransomware as a Service attacks poised to accelerate in 2017

Ransomware can be likened to global warming. It’s been around for years, but it’s now becoming an epidemic which needs serious attention. According to a recent survey …

path
The difficult path to cyber resilience

Global organizations are more confident than ever that they can predict and resist a sophisticated cyber attack, but are falling short of investments and plans to recover from …

hot
Deadlines for investigating and reporting data breaches

75% of organisations set fixed time limits for investigating potential security incidents, according to Balabit. However, 44% of respondents reported missing internal or …

Week in review: Yahoo breach, malvertising targeting routers, the economics of ransomware

Here’s an overview of some of last week’s most interesting news and articles: Malvertising campaign compromises routers instead of computers The attackers current …

https
Secure websites brought to you by the letter S

What’s so special about the letter S? It’s one of the most frequently used letters in the English language, a regular sponsor of Sesame Street, and is so common that Vanna …

door
Delayed breach notifications open door to regulatory fines

As more data breaches occur everyday and more data privacy regulations come into force, such as EU GDPR, organizations are beginning to make data governance and data …

keys
Growth rates of cryptographic keys and certificates

A new study conducted by Dimensional Research evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools