Please turn on your JavaScript for this page to function normally.
How complex attacks drive the IT security innovation race

There’s a need for organizations to reduce time to detection (TTD) in order to remediate against sophisticated attacks by highly motivated threat actors, according to …

New Google Drive phishing campaign exposed

Elastica discovered a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised websites …

Automated threat management: No signature required

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …

Internet of Things: Bracing for the data flood

There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer …

Edward Snowden to discuss privacy at IP EXPO Europe 2015

Edward Snowden will deliver a keynote at IP EXPO Europe 2015, taking place at London’s ExCel. Joining the event live via satellite on Wednesday 7th October, Snowden will share …

Most employees don’t understand the value of data

New research from Fujitsu has revealed that only 7% of employees rate their business data higher than their personal information. The results highlight how employees don’t …

Three steps to a successful cloud migration

People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use. This stockpile adds up, …

A data security guy’s musings on the OPM data breach train wreck

Despite all the media attention to breaches, there is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with …

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposedHere’s an overview of some …

Security flaws discovered in popular Smart Home Hubs

Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …

Why cloud business continuity is critical for your organization

Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders. Many …

Smartwatches: A new and open frontier for attack

Smartwatches with network and communication functionality represent a new and open frontier for cyberattack, according to HP. They found that 100 percent of the tested …

Don't miss

Cybersecurity news