Please turn on your JavaScript for this page to function normally.
Data classification ranks in top 3 security controls

Bloor Research surveyed 200 senior IT security executives in the UK and the US, all with organizations that have more than 1,000 employees. More than half (54%) of …

A few small steps for man, a giant leap for online security

The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …

Tired of paying for automated scanning and still seeing your website hacked?

Try ImmuniWeb now. ImmuniWeb combines automated assessment with manual penetration testing performed by experienced security experts. Recently reviewed in Help Net Security, …

Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, interviews and articles: A threat assessment of 7 million iOS and Android apps Android malware is …

Windows vulnerable to FREAK attacks after all

Microsoft has released a security advisory on Thursday, confirming that all supported releases of Microsoft Windows are vulnerable to the recently documented FREAK (Factoring …

Cryptowall makes a comeback via malicious help files

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware. Cryptowall is an advanced version of Cryptolocker, …

Expert tips to address third party security risks

Risks to sensitive data have never been greater. With the rise in cyber attacks and data breaches, outsourcing to third parties can present an exponential threat to …

Top priorities for internal audit professionals

Internal audit professionals are making strides in meeting cybersecurity and data privacy standards, according to Protiviti. Much work remains, with many of the surveyed …

SanDisk InfiniFlash storage targets Big Data workloads

SanDisk unveiled an all-flash storage platform that creates a new category for the IT industry, termed by IDC as Big Data Flash. Built using open source software, …

Financial firms are putting more stock in the cloud

Many financial firms are slowly putting more stock in the cloud. That’s a key finding from a new Cloud Security Alliance (CSA) survey, which targeted executives from …

What security tools do healthcare organizations lack?

The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused …

How DDoS attacks impact service providers

There’s a striking disparity between how threatened service providers feel by potential DDoS attacks and how prepared they are to mitigate one, according to a Black …

Don't miss

Cybersecurity news