Please turn on your JavaScript for this page to function normally.
Inside job: 6 ways employees pose an insider threat

CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …

SQL injection has surfaced as the no. 1 attack in 2015

A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …

Pirate flag
Malware threats on pirated content sites

Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being …

RSA Conference Innovation Sandbox 2015
RSA Conference opens Innovation Sandbox Contest

The RSA Conference annual Innovation Sandbox Contest is now accepting submissions to name the “RSAC Most Innovative Startup 2016.” Past winners include successful companies …

Six trends that will further the development of the Internet of Things

1. The death of the password is rapidly approaching. New and more serious data breaches among well known consumer brands will continue to erode faith in perimeter and …

The impact of data breaches on customer loyalty

Nearly two-thirds (64%) of consumers worldwide say they are unlikely to shop or do business again with a company that had experienced a breach where financial information was …

Do CEOs know enough about cyber security?

One-third of CEOs and 43 percent of management teams are not regularly briefed on cyber security issues, according to Dimensional Research. Additionally, while 79 percent of …

Only 5% of organizations protect credentials

In order to find the riskiest industries in the cloud, CloudLock analyzed 10 million users, 1 billion files, and over 91,000 applications, focusing on and breaking down risk …

10 tips to help organizations stay secure this holiday season

Optiv Security shared a list of the top 10 things organizations can do to help them stay secure during the holiday season.1. Know who on your security team is on vacation and …

Next year, smart cities will use 1.6 billion connected things

Gartner estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39 percent from 2015.“Smart commercial buildings will be the …

Turn the Cyber Kill Chain against your attacker

As businesses move to the cloud, the rapid adoption of Infrastructure as a Service (IaaS) is no surprise. Unfortunately, securing the cloud and the data within it is no easy …

Only 37% of SMBs think they’re equipped to manage IT security

Just 37% of IT decision makers surveyed in the US, the UK, and Australia believe their organisations are completely ready to manage IT security and protect against threats. …

Don't miss

Cybersecurity news