Please turn on your JavaScript for this page to function normally.
NIST revises security publication on random number generation

In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for …

Security concerns continue to dog the cloud industry

Executives at major North American companies believe conventional network security solutions aren’t enough to protect their cloud computing environments, especially when it …

5 ways to stop the Internet of Things from becoming the Internet of Thieves

The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …

4 in 10 midsize businesses have experienced a data breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …

Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles:Penetration Testing With Raspberry PiRaspberry Pi is a small and …

Why a low-level threat can open the door for serious infections

“A device hi-jacked for the purpose of conducting click-fraud can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how …

How companies can regain consumer trust after a data breach

Americans have strong feelings about data breach notification, with 84 percent stating that the best way a company can regain their trust after a breach occurs is to notify …

Energy security pros: More competent, or just naive?

Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …

The cloud, FedRAMP and FISMA compliance

Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, …

How to survive a compliance audit

Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …

Nigerian scammers are stealing millions from businesses

When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …

Hackers are spending a huge amount of resources targeting financial services

Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous …

Don't miss

Cybersecurity news