Please turn on your JavaScript for this page to function normally.
The rise of mobile transactions and online lending fraud

During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. …

Evaluating the security of open source software

The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on …

The rise of artificial intelligence technologies

The advance of artificial intelligence (AI) technologies has caught the attention of companies and institutions in a wide range of enterprise markets, and executives in almost …

Most security executives lack confidence in their security posture

A new Raytheon|Websense survey of security executives at large companies in the U.S. reveals that confidence in their enterprise security posture is lacking.According to the …

The insider versus the outsider: Who poses the biggest security risk?

Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders …

The unstoppable rise of DDoS attacks

For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …

Keep your site more secure with WordPress 4.3

WordPress 4.3, named Billie in honor of jazz singer Billie Holiday, is available for download or update in your WordPress dashboard.The new version enables you to keep your …

Solving the third-party risk management puzzle for PCI

One of the main PCI compliance challenges for businesses is how to accurately document and monitor the payment data and personal information they hold and share with third …

IBM is betting big on open source in the enterprise

IBM launched LinuxONE, a new portfolio of hardware, software and services solutions, providing two distinct Linux systems for large enterprises and mid-size businesses.The …

Five points of failure in recovering from an attack

An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection …

Privileged accounts are still easy to compromise

A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …

Maintaining security during your healthcare merger or acquisition

With continuous changes in the information security landscape and high profile breaches being announced on a seemingly weekly basis, healthcare providers need to ensure they …

Don't miss

Cybersecurity news