Please turn on your JavaScript for this page to function normally.
CTO insights: Defending your organization from insider attacks

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received …

Infosec: Don’t fear the word

Are these words too difficult for you? Basilisk, snuffleupagus, supercalifragilisticexpialidocious, Quidditch, Oompa Loompa. I hope not! They’re all part of the magical world …

C-level executives are less confident than their boards or IT execs

A new Dimensional Research study examined corporate executives’ view of cybersecurity risks, as well as measured their confidence and preparedness in the event of a security …

How secure are digital transactions?

The online payment industry was exposed to a slew of attacks in 2013-14, with hackers meticulously examining the payment infrastructure to exploit potential weaknesses. To …

Impact of new data protection legislation not widely understood

Almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their …

Chrome extension protects your Google account from phishers

Google developers have created Password Alert, an open source Chrome extension that aims to prevent users from entering their Google password in a phishing site or, …

93% of DDoS attacks last 30 minutes

As the tide of DDoS attacks continues to expand, the rise of the Internet of Things (IoT) and the influx of network connected devices, such as webcams and routers, are leading …

Unpatched, vulnerable PDF readers leave users open to attack

Unpatched, vulnerable PDF readers are a big security issue for private PC users, according to Secunia. 14% of PC users in the US (up from 12.9% last quarter) have an unpatched …

Threats on government networks remain undetected for 16 days

Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …

High volume DDoS attacks still persistent

Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …

Police dismantle gang of online fraudsters and romance scammers

The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were …

Big Data and analytics are changing the cybersecurity landscape

Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all …

Don't miss

Cybersecurity news