Please turn on your JavaScript for this page to function normally.
fish phishing
Phishing underground: Exploiting the human vulnerability

At the RSA Conference in San Francisco, PhishLabs exposed the murky evolution of a thriving, sophisticated phishing underworld. Their report is based on more than one million …

Businessman
Are CIOs wasting millions on infosec that doesn’t work?

There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving …

Lock
IoT wishes for RSA Conference 2016

With so many questions to be answered on the future of security and IoT, I’m happy to see that, once again, it’s that special time of the year when the collective movers and …

Money
A mobile data breach could cost you $26.4 million

While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile …

Fire
The rise of polymorphic malware

97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …

eye
Week in review: Linux Mint hack, crypto ransomware hits hospitals, and educating policymakers on cybersecurity

Here’s an overview of some of last week’s most interesting news and articles: Can poorly designed embedded devices kill? The industry is not taking safety and …

Linux
Protecting enterprise data centers from threats that target Linux servers

Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …

lights
ServiceNow reinvents security response

ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …

San Francisco
CyberCalifornia initiative to facilitate research and innovation

More than ever, California stands at the forefront of new technologies based on the Internet of Things (IoT). We are also increasingly vulnerable, a fact underscored by …

EU flag
Start getting ready for Europe’s new data protection regulation today

You are in charge of your organization’s security. Depending on how large and well resourced your business IT function is, your card might read IT director, CIO, CTO, or …

mobile
Is zero-effort computer security a dream?

Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for …

embedded
Can poorly designed embedded devices kill?

The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …

Don't miss

Cybersecurity news