Please turn on your JavaScript for this page to function normally.
How the Internet of Things impacts enterprise security

A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study …

Open source software for quantum information

NIST has partnered with the private sector to develop the next-generation open source control software for quantum information systems. NIST is a world leader in quantum …

APTs: Minimizing losses with early detection

Let’s travel back to 2006, the year the blockbuster, “The Departed,” came out. Matt Damon plays a young criminal who has infiltrated the state police as an …

Week in review: HealthCare.gov leaks user data, Angler kit exploits Flash 0-day, researchers recreate NSA’s spying tools on the cheap

Here’s an overview of some of last week’s most interesting news, interviews and articles: Has the time come to give up penetration testing? The more miles of …

Why leaving a shared device unprotected is dangerous

According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …

DMARC: The time is right for email authentication

It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same—architects try to build …

5 tips for dealing with cyberbullying in education

According to the latest figures by nobullying.com, 68 per cent of teens agree that cyber bullying has now become a serious problem in schools. This is exacerbated by the fact …

79% of professionals do business on personal devices

As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …

Why insider threat is thriving

In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint …

How health care providers can protect sensitive data

Despite increasingly stringent industry regulations a lot of health care organizations along with their business associates often fail to ensure integrity of sensitive …

Can the next EU regulation guarantee data protection for all?

The European Parliament has agreed its text, the Commission is satisfied with the latest draft, so now we’re are only waiting for the Council of member states to work …

Reactions to President Obama’s 2015 State of the Union Address

President Obama’s State of the Union Address featured a new legislative focus on cyber security issues: No foreign nation, no hacker, should be able to shut down our …

Don't miss

Cybersecurity news