Please turn on your JavaScript for this page to function normally.
Keyboard
Build security design principles into cyber-physical systems

We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …

Imperva Incapsula DDoS whitepaper
Whitepaper: Protecting financial institutions from DDoS attacks

In response to the growing DDoS threat, the FFIEC issued a statement requiring banks and financial institutions to monitor their networks for DDoS attacks and proactively …

signal
Consumers willing to share personal info for a reward

Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …

zen
State of security: Human error and remembering the essentials

It seems that in a sea of complex digital ploys, companies are trying so hard to guard against the next big threat that they have forgotten the basics. From years of extensive …

binary bomb
Security breaches hit nearly three in four organizations

A troubling 73 percent of organizations have been plagued by at least one security breach or incident in the past year, with about 60 percent of breaches categorized as …

Rising threats to boost government IT security spending

Technavio analysts expect global government IT security spending to exceed USD 42 billion by 2020, growing at a CAGR of over 9%. “The global IT security spending in the …

eye
Hidden in plain sight: Four signs your network might be under attack

It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …

Money
Online transaction fraud to reach $25 billion by 2020

Online transaction fraud is expected to reach $25.6 billion by 2020, up from $10.7 billion last year, according to Juniper Research. This means that by the end of the decade, …

award
Free badge program helps determine the security of open source software

The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that aims to improve the security of critical open source projects, issued its first round …

Gozi malware creator sentenced to time served

Nikita Kuzmin, the creator of the Gozi malware, was sentenced on Monday in Manhattan federal court to time served (37 months). He was also ordered to pay nearly $7 million in …

user
Cybercriminals filtering out victims by location

There’s a growing trend among cybercriminals to target and even filter out specific countries when designing ransomware, according to SophosLabs. To lure more victims …

person
Third party risk on the rise, risk mitigation still not a priority

Given today’s cyber security climate, it is no surprise that companies are wary of the risks associated with third party vendors. Unfortunately, these risks are only …

Don't miss

Cybersecurity news