Please turn on your JavaScript for this page to function normally.
Prices of stolen data on the Dark Web

Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online …

Existing security standards do not sufficiently address IoT

A lack of clarity and standards around Internet of Things (IoT) security is leading to a lack of confidence.According to the UK IT professionals surveyed by ISACA, 75 percent …

Cyberattacks will cost U.S. health systems $305 billion

Cyberattacks over the next five years will cost U.S. health systems $305 billion in cumulative lifetime revenue. Accenture estimates that one in 13 patients – roughly 25 …

When it comes to breaches, time is the biggest challenge

A new SANS report includes results of a survey that polled 430 security and risk professionals from the SANS community, all working in private and public sector organizations …

Global Internet experts reveal plan for more secure, reliable Wi-Fi routers

In a letter submitted to the Federal Communications Commission (FCC), Dave Täht, co-founder of the Bufferbloat Project, and Dr. Vinton Cerf, co-inventor of the Internet, along …

How to become a nightmare for cyber attackers

Chris Nickerson, CEO of Lares Consulting, has been a penetration tester for the last 15 year or so. He headed red teams targeting systems and environments known and unknown, …

The countdown to the EU Data Protection Regulation

The scope of the changes under the proposed shift to a single EU Data Protection Regulation, means that organisations should be doing the groundwork now to ensure they’re not …

Companies investing in cloud, security and Big Data are growing faster

Organizations actively using cloud, mobility, big data or security technologies are experiencing up to 53 percent higher revenue growth rates than those that have not invested …

Secure networks are the key to unlocking A2P potential

75% of mobile network operators (MNOs) do not have the measures in place to control and monetize Application-to-Person (A2P) SMS traffic that traverses their network, …

Cybersecurity expectations: Myth and reality

Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online, according to Intercede.The number of …

Internet of Things: Connecting the security dots from application design to post-sale

The age of Internet of Things is upon us. While it’s still early days, Gartner predicts that by 2020, the Internet of Things will be made up of 26 billion connected devices …

Compliance vs. cybersecurity: Insurers face competing priorities

Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …

Don't miss

Cybersecurity news