Please turn on your JavaScript for this page to function normally.
How many employees present a cloud security risk?

Based on analysis across 10 million users, 1 billion files, and over 91,000 applications, CloudLock focused on the riskiest element in the cloud: user behavior.1 percent of …

Malvertising campaigns increase 325 percent

Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks. Researchers found that malvertising …

Average financial services company uses 1,004 cloud applications

Skyhigh Networks analyzed cloud adoption in the financial services industry.The average financial services company uses 1,004 cloud services, which comes as a surprise to many …

Analyzing fraudulent and high-risk behaviour events

NuData Security announced new threat intelligence that provides insight into the latest trends in online fraud.Account takeover, in which fraudsters steal an established …

The changing focus around critical infrastructure protection

I spend a fair amount of time attending various security conferences, as I’m sure many of you do. Recently I’ve noticed a change in agendas and, perhaps more significantly, …

Unmanaged Apple devices are a liability for corporations

While people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities, according to a new survey by …

Jimmy Wales confirmed as opening keynote speaker at IP EXPO Europe 2015

Jimmy Wales, entrepreneur and founder of Wikipedia, will deliver the opening keynote speech this year at IP EXPO Europe 2015, taking place at London’s ExCeL.At the event on …

Combatting human error in cybersecurity

Mistakes are part of life, but unfortunately in cybersecurity operations, mistakes have the potential to be financially devastating to the business. According to a 2014 IBM …

Risky mobile behaviors are prevalent in the government

Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …

Top 3 biggest mistakes enterprises make in application security

Enterprise information security encompasses a broad set of disciplines and technologies, but at the highest level it can be broken down into three main categories: network …

If you build it, they will come

If you build it, they will come. But will you be ready? Will any of us? It’s almost impossible to escape the topic of the Internet of Things (IoT). Whatever the technology …

Cybercriminals are becoming more creative

The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …

Don't miss

Cybersecurity news