Please turn on your JavaScript for this page to function normally.
Risk IT and services spending to reach $78.6 Billion in 2015

According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …

Workplace stress dramatically impacting IT professionals

High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …

APTs: The fine balance of control and monitoring

Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …

Top cyber attack vectors for critical SAP systems

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …

Criminal attacks in healthcare are up 125% since 2010

The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks—exposing millions of patients and their medical records, according …

Cyber attacks aren’t just targeting big business

81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues.The …

72% of companies are not prepared for a data breach

EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …

Crimeware infects one-third of computers worldwide

The APWG reports that during the 4th quarter of 2014, a record number of crimeware variants were detected, a strategy of overwhelming proliferation of variations designed to …

The enduring chasm between security teams and developers

The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing …

Data security in the payments ecosystem

Experian Data Breach Resolution and the Ponemon Institute asked professionals to weigh in on several topics including who should be responsible for securing payment systems …

Rapid7 acquires NT OBJECTives, offers web app scanning

Rapid7 has acquired NT OBJECTives (NTO), expanding Rapid7’s Threat Exposure Management offering to further meet the needs of business infrastructures.NTO’s application …

Week in review: Researchers hack surgery robot, 5-year-old malware turns Linux servers into spamming machines

Here’s an overview of some of last week’s most interesting news, podcasts and articles:The invasion of biometricsDepending on where you stand biometrics is a good …

Don't miss

Cybersecurity news