Please turn on your JavaScript for this page to function normally.
vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

business
Exposing the Cybercrime as a Business model

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …

desk
Employees risk corporate security by accessing pirated content

6 in 10 Brits who use personal devices for work also use the same device for streaming or downloading pirated content. Whilst the research, conducted by OnePulse, found that …

Europe
Five steps to GDPR compliance

For any organisations processing personal data the General Data Protection Regulation (GDPR) is important news. Agreed upon just days ago, after years of negotiations, the …

SIM cards
SIM Swap fraud is gaining momentum

SIM Swap fraud or SIM Splitting, a financially-motivated mobile phone threat, is gaining momentum according to Foursys. Remote banking losses increased significantly last …

Match
ISPs are putting their enterprise customers at risk of DDoS attacks

The vast majority of enterprise end users (85%) want their ISPs to offer more comprehensive DDoS protection-as-a-service, according to Corero Network Security. The research, …

market
Global security appliance market continues to grow

The global security appliance market is projected to grow at a CAGR of more than 11% by 2020. Global security appliance market by large enterprises Technavio predicts the …

brain
AI system predicts cyber attacks using input from human experts

Today’s security systems usually fall into one of two categories: man or machine. So-called “analyst-driven solutions” rely on rules created by human experts …

abstract broken connections
US government is lousy at cybersecurity

SecurityScorecard released its 2016 Government Cybersecurity Report, a comprehensive analysis that exposes alarming cybersecurity vulnerabilities across 600 local, state, and …

Keyboard
Spring network cleaning: Quick tips to reduce risk

Spring is here, which means many people will be cleaning their workspace and getting rid of the clutter on their desks. If you’re in charge of your organization’s security, we …

world in hand
Week in review: The inconvenient truth about API security, and the perfect exfiltration technique

Here’s an overview of some of last week’s most interesting news and articles: Uninstall QuickTime for Windows today! Trend Micro’s Zero Day Initiative has released …

threat hunting
The rise of threat hunting

85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …

Don't miss

Cybersecurity news