Please turn on your JavaScript for this page to function normally.
How attackers attempt to infect organizations

A new report by Palo Alto Networks, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical …

High prevalence of personal health information at risk

The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances …

Winnti group’s attack platform is based on decade old malware

“Kaspersky Lab experts tracking the activity of the Winnti group have discovered an active threat based on a 2006 bootkit installer. The threat, which they name HDRoot …

It’s not just about Big Data, it’s what you do with it

Worldwide IT spending is forecast to surpass $3.6 trillion in 2016, a 1.5 percent increase from 2015, according to Gartner, Inc. The IT industry is being driven by digital …

Applying machine learning techniques on contextual data for threat detection

The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you …

Attackers prefer lower-bandwidth DDoS attacks

Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade …

Cybersecurity is being taken seriously around the globe

There has been a dramatic increase in the attention that boards and executives are paying to cybersecurity risk management, according to a new global study developed by the …

Top 5 Android Marshmallow enterprise security benefits

Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual …

Is your board ready for a security incident?

Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …

Prevention is the best cure for identity theft

In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …

The changing role of the risk manager

71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …

Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0

Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …

Don't miss

Cybersecurity news