Please turn on your JavaScript for this page to function normally.
energy
Defending the smart grid: What security measures to implement

Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …

Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data

Here’s an overview of some of last week’s most interesting news and articles: There’s no turning back: Say goodbye to the perimeter If you’ve been following …

deep web
The history of cyber attacks: From ancient to modern

In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

Compromised enterprise networks fuel 236 percent increase in viruses and worms

Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …

matches
Consumers are increasingly concerned about privacy and they’re acting on it

More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by …

RSA Conference Innovation Sandbox
Innovation Sandbox Contest 2016 finalists announced

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

healthcare
Why cybercriminals target healthcare data

In 2015, one in three Americans were victims of healthcare data breaches, attributed to a series of large-scale attacks that each affected more than 10 million individuals. …

data
Most large organizations will have a Chief Data Officer by 2019

The race to drive competitive advantage and improved efficiency through better use of information assets is leading to a sharp rise in the number of chief data officers …

Broken glass
Larger, more complex, financially motivated DDoS attacks on the rise

DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, the results of Arbor Networks’ …

Wi-Fi Zone
1 in 3 home routers will be used as public Wi-Fi hotspots by 2017

Juniper Research predicts that at least 1 in 3 home routers will be used as public Wi-Fi hotspots by 2017, and that the total installed base of such dual-use routers will …

light
Data protection and breach readiness guide

The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …

entrepreneur
Europe’s cyber security accelerator program helps entrepreneurs

A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …

Don't miss

Cybersecurity news