Please turn on your JavaScript for this page to function normally.
Test your cybersecurity knowledge and decision-making skills

CIOs have watched data security rise on their list of priorities as the number of sophisticated, targeted cyberattacks continue to escalate. To educate audiences who are …

Preventing and detecting insider threats

SANS surveyed 772 IT security professionals regarding their experiences preventing and detecting insider threats within their organizations. Although 74 percent are concerned …

DARPA to create software systems that last 100 years

As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid …

Worldwide IT spending to decline in 2015

Worldwide IT spending is set to shrink to $3.66 trillion in 2015, a 1.3 percent decrease from 2014, according to the latest forecast by Gartner. “We forecast …

RSA Conference 2015
Alec Baldwin to deliver closing RSA Conference 2015 keynote

Television and film star Alec Baldwin will be part of the closing ceremonies for RSA Conference 2015 taking place on Friday, April 24th in San Francisco, CA. Celebrated as one …

MitM, DoS bugs in Network Time Protocol squashed

Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest …

Polymorphic Beebone botnet sinkholed in international police operation

On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …

The need for end-user visibility in a Bring Your Own Anything environment

Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …

Cybercrime gets easier, attribution gets harder

Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …

Securing high-risk, third-party relationships

High-profile attacks reveal that malicious hackers target third-party vendors and supply chain partners as a backdoor into their primary target, according to CyberArk …

Guide outlines specifications of smart card-based PACS

Smart cards are increasingly accepted as the credential of choice for securely authenticating identity, determining appropriate levels of information access and controlling …

Are you prepared for dealing with a breach?

RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …

Don't miss

Cybersecurity news