Please turn on your JavaScript for this page to function normally.
Cloud
Cloud shift will affect $1 trillion in IT spending

More than $1 trillion in IT spending will be directly or indirectly affected by the shift to cloud during the next five years, said Gartner, Inc. This will make cloud …

secure
Companies are unprepared to protect key assets

Knowledge assets are confidential information critical to a company’s core business – other than personal information that would trigger notice requirements under …

Borderless Cyber Europe
Andrus Ansip to keynote Borderless Cyber Europe

Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations can no longer adequately defend …

Kickass Torrents
Alleged Kickass Torrents owner arrested, site taken down

Artem Vaulin, a 30-year-old Ukrainian that is believed to be the creator and owner of Kickass Torrents, currently the most popular and most visited illegal file-sharing …

sap
Vulnerabilities affecting SAP HANA and SAP Trex put 10,000 customers at risk

Onapsis released new security advisories detailing vulnerabilities in SAP HANA and SAP Trex. Included in the advisories is a critical risk vulnerability that could be used to …

EU
Preparing for new EU cybersecurity rules and regulations

Recently, the European Parliament signed off on its first ever set of cybersecurity rules. The Network and Information Security (NIS) Directive spells the end of more than …

lighter
1 in 3 content theft websites expose visitors to malware

A Digital Citizens investigation has found that malware operators and content theft website owners are teaming up to target consumers – with an unexpected assist from …

entrepreneur
Challenges of cybersecurity due diligence in the acquisition process

Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …

wire
Overreliance on perimeter-based defense creates opportunities for attackers

RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …

Black Hat USA 2016
Three topics everyone will be talking about at Black Hat USA 2016

There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding …

Connect
Cyber synergy: The need for collaborative cyber intelligence

It’s official – cybercrime now has a bigger impact than any other form of crime in the UK. That’s the conclusion drawn by the National Crime Agency (NCA) and Strategic Cyber …

business
Five trends to help senior executives protect against fraud threats

A new Experian report identifies five trends that businesses should assess and take action on to mitigate fraud and improve the customer experience in today’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools