Please turn on your JavaScript for this page to function normally.
Magnify
Who owns corporate data? Employees think they can just take it

A third of all employees believe they own – or share ownership of – the corporate data they work on, with half thinking they can take the data with them when they …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

explode
eBook: Guide to protecting SaaS apps from DDoS attacks

With a business model dependent on 100% uptime for their online customers, the last thing SaaS companies can afford is a DDoS attack. Read this DDoS eBook from Incapsula and …

IoT
The security impact of IoT evolution

Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

server
The state of the cloud and the Software-Defined Data Center

We’ve long been moving toward cloud-based and virtualized infrastructures, but in some ways 2016 might just be the year in which the Software-Defined Data Center (SDDC) really …

Vivaldi
Opera Software founder launches Vivaldi, a new browser

After more than one year in public development and millions of downloads, Vivaldi today released the first major release of its desktop browser: Vivaldi 1.0. The UI uses React …

Businessman
Take it to the boardroom: Elevating the cybersecurity discussion

As data breaches continue to rise, organizations, regardless of their size or industry they are in, must take into consideration a new mindset. Despite the FBI’s focus on …

glass building
Does hybrid IT offer a competitive advantage?

Hybrid IT is about more than saving money. A survey of IT decision-makers at major financial services, retail, health care, and other organizations found that 50 percent have …

money
Calculate the cost and probability of a DDoS attack

DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor …

danger
The dangers of bad cyber threat intelligence programs

I love a surprise ending in a movie. Whether I’m watching drama, action, or sci-fi, there’s nothing better than a plot twist you can’t predict. At work, however, I feel the …

authentication
Global IAM market to reach 24.55 billion by 2022

The global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets. Increased spending by large scale …

world in hand
Week in review: Hackers breaching law firms, ransomware flare-up, and how to get your talk accepted at Black Hat

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Hackers breaching law firms for insider trading info Two of the most …

Don't miss

Cybersecurity news