Please turn on your JavaScript for this page to function normally.
Security analytics: The key for breach detection?

Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced …

IBM unveils cyber threat intelligence sharing platform

IBM is making its vast library of security intelligence data available via the IBM X-Force Exchange, a new cyber threat intelligence sharing platform powered by IBM Cloud. …

Internet of Everything attack surface grows

The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …

What IT skills are in demand?

More than 11,000 IT and business professionals in North America responded to the eighth annual IT Skills and Salary Survey by Global Knowledge and Windows IT Pro. Key …

Perception and reality of perimeter security effectiveness

A widening gap is emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing …

New Java vulnerabilities remotely executable without login

It is extremely important that enterprises urgently patch their Java Runtime Environments (JREs) and (Java Development Kits) JDKs since 14 vulnerabilities addressed in this …

PCI DSS 3.1 released

The PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision includes minor updates and …

How can defenders gain advantage in the 0day market?

According to MIT, Harvard, and HackerOne researchers, the answer is not throwing more money at bug hunters, but incentivize them to find the the same vulnerabilities that the …

Microsoft releases 11 security bulletins

Administrators and security teams are in for a busy day tackling 11 Microsoft security bulletins, Adobe updates and Oracle has pre-announced that their quarterly update …

New trend in cybercriminal activity: APT wars

Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another. In 2014, Hellsing, a small and technically unremarkable cyberespionage group …

RSA Conference 2015
Lack of skilled infosec pros creates high-risk environments

82 percent of organizations expect to be attacked in 2015, but they are relying on a talent pool they view as largely unqualified and unable to handle complex threats or …

Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

Don't miss

Cybersecurity news