Please turn on your JavaScript for this page to function normally.
GCHQ
GCHQ open sources Gaffer, a data collection and mining framework

GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …

Trojan
Operation targets users of remote access trojans across Europe

In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …

How to eliminate encryption silos

Working in the encryption business, you’ll quickly learn that there are a number of problems that organizations can run into while deploying the technology. The …

DDoS
Are your competitors organizing DDoS attacks against you?

According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …

Hadoop
Is Hadoop secure enough for the enterprise?

An ever-increasing number of organisations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or …

Cybercriminals increasingly hunting down the money

The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …

Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: New Steam escrow system drives impatient users to fake trading sites serving malware …

Inside job: 6 ways employees pose an insider threat

CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …

SQL injection has surfaced as the no. 1 attack in 2015

A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …

Pirate flag
Malware threats on pirated content sites

Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being …

RSA Conference Innovation Sandbox 2015
RSA Conference opens Innovation Sandbox Contest

The RSA Conference annual Innovation Sandbox Contest is now accepting submissions to name the “RSAC Most Innovative Startup 2016.” Past winners include successful companies …

Six trends that will further the development of the Internet of Things

1. The death of the password is rapidly approaching. New and more serious data breaches among well known consumer brands will continue to erode faith in perimeter and …

Don't miss

Cybersecurity news