Please turn on your JavaScript for this page to function normally.
cloud
Cloud adoption hits all-time high, Microsoft and Google dominate

With continued growth in use of Office 365 and G Suite, overall cloud adoption has hit an all-time high, according to Bitglass. Fifty-nine percent of organizations worldwide …

RSA Conference 2015
Former MI5 director general Dame Stella Rimington to keynote RSA Conference 2017

Dame Stella Rimington will be part of the keynote speaker lineup for RSA Conference 2017 in San Francisco, CA. Dame Stella was formerly Director General of the Security …

lights
Key causes of network outages and vulnerabilities

A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …

gift
Preparing for the holiday shopping season? Cybercriminals are getting ready as well

The number of financial phishing attacks is expected to rise during the Holiday shopping season which starts unofficially on Black Friday. Retrospective research by Kaspersky …

web
Weave a web of deception to secure data

Today’s technically superior and incredibly well-funded (often state-funded, in fact) hackers are not impressed with breach prevention and traditional security solutions. …

Waterfall BlackBox
Waterfall BlackBox: Restoring trust in network information

Waterfall Security Solutions announced the launch of the Waterfall BlackBox, developed to maintain the integrity of log repositories in the event of a cyber attack. Based on …

Hands
How hackers will exploit the Internet of Things in 2017

The Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, …

brain
Consumer and business perspectives on IoT, augmented reality risks

As every business becomes a digital business, the spread of technology such as augmented reality (AR) and Internet of Things (IoT) devices can add significant business value …

travel
Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

Europe
Are you ready for the EU GDPR?

Current application test data management practices are not adequate to meet the compliance requirements of the EU General Data Protection Regulation (GDPR), according to CA …

traffic
Week in review: Tesco Bank breach, and a checklist for people who understand cyber security

Here’s an overview of some of last week’s most interesting news and articles: Bug in Chrome for mobile exploited for drive-by Android malware downloads Users of …

lock
How to prepare your company for cybersecurity threats

When the FBI announced the arrest of a Russian hacker in October, it was notable – but maybe not for the reason you’d expect. Yevgeniy N., who was picked up in Prague, is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools