Please turn on your JavaScript for this page to function normally.
bomb
6,013 breaches reported in the US since 2005

In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 …

building
Panama Papers: A data security disaster

The Panama Papers security breach is a juicy, made-for-the-Internet scandal. It has all the elements – secret off-shore accounts; involvement by international politicians, …

Netwrix
Netwrix Auditor 8.0: Visibility into hybrid cloud IT infrastructures

Netwrix released Netwrix Auditor 8.0. The new version of the IT auditing platform simplifies detection of security threats and enables organizations to gain control over …

Microsoft
Microsoft patches Badlock, but doesn’t call it critical

Microsoft just released several security bulletins, with six marked as critical and seven categorized as important. The biggest surprise (or disguise) came in the patch marked …

lock
Cybercriminals are adopting corporate best practices

Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …

cloud computing
Attacks are driving cloud security market growth

The global cloud security market is expected to grow at a CAGR of over 20% until 2019, according to Technavio. “A key reason for the adoption of cloud security is the sudden …

The Release
Documentaries about an expert convicted of leaking classified information

Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …

lights
Developing the perfect exfiltration technique

At SafeBreach, one of our major research areas is exfiltration (sending sensitive data out of the corporate network). In one of our research projects in late 2015, we set out …

skull binary
The inconvenient truth about API security

Ovum Consulting asked IT and security professionals across a variety of industries globally about their use of APIs, adoption of API management platforms, and the security …

Bomgar survey
Are your vendors leaving you vulnerable?

Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …

general virtual digital
Week in review: Panama Papers, dark web mapping, WhatsApp end-to-end encryption

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Panama Papers breach was the result of lax security practices? News items …

energy
Surge in cyber attacks on the energy sector

A new survey conducted by Dimensional Research, which was carried out in November 2015, assessed cyber security challenges faced by organizations in the energy sector. Study …

Don't miss

Cybersecurity news