Please turn on your JavaScript for this page to function normally.
Waterfall BlackBox
Waterfall BlackBox: Restoring trust in network information

Waterfall Security Solutions announced the launch of the Waterfall BlackBox, developed to maintain the integrity of log repositories in the event of a cyber attack. Based on …

Hands
How hackers will exploit the Internet of Things in 2017

The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, …

brain
Consumer and business perspectives on IoT, augmented reality risks

As every business becomes a digital business, the spread of technology such as augmented reality (AR) and Internet of Things (IoT) devices can add significant business value …

travel
Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

Europe
Are you ready for the EU GDPR?

Current application test data management practices are not adequate to meet the compliance requirements of the EU General Data Protection Regulation (GDPR), according to CA …

traffic
Week in review: Tesco Bank breach, and a checklist for people who understand cyber security

Here’s an overview of some of last week’s most interesting news and articles: Bug in Chrome for mobile exploited for drive-by Android malware downloads Users of …

lock
How to prepare your company for cybersecurity threats

When the FBI announced the arrest of a Russian hacker in October, it was notable – but maybe not for the reason you’d expect. Yevgeniy N., who was picked up in Prague, is …

cloud computing
SMBs risk data security by using free cloud storage

SMBs risk data security if they use free cloud storage, but nearly 25% still do, despite warnings from industry experts. In addition, new findings reveal that 11% of SMBs are …

email
Malicious spam volume hits two year high

According to the Kaspersky Lab Spam and Phishing in Q3 report, the company’s products blocked 73,066,751 attempts to attack users with malicious attachments. This is the …

hole
The cybersecurity gap between IT capabilities and business expectations

Deloitte has uncovered a shift in business priorities from “business performance” to “customers,” with 57 percent of chief information officers …

shop online
Will security concerns negatively impact the online holiday shopping season?

In a survey of over 1,900 consumers crossing the US and UK, Computop found 76 percent planned to shop online this holiday season. However, 62 percent of those respondents …

world
GDPR privacy, preparations and understanding

A new GDPR privacy benchmarking study by IAPP and TRUSTe provides insight into how companies are preparing for the sweeping changes to privacy laws under the EU General Data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools