Please turn on your JavaScript for this page to function normally.
1 in 5 employees going rogue with corporate data

Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded …

eBook: Cybersecurity for Dummies

NOTE: This book is no longer available, thanks for your interest. APTs have changed the world of enterprise security and how networks and organizations are attacked. These …

Companies invested millions in privacy in 2014

As the number of data breaches in the U.S. reached 708 in 2014, new research shows that companies are investing millions in privacy and multiple business units are now …

The problem with security shortcuts

A combination of irresponsible user behavior and weaknesses in the protection of networks could create more risks for data breaches during the holiday period than at any other …

Web Application Firewall revenue to reach $777.3 million in 2018

The global Web application firewall (WAF) market was once primarily driven by regulatory requirements to protect Web applications and the sensitive customer data they collect. …

HIPAA security compliance: How risk tolerant are you?

At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …

Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles: Software security in a market for lemons Programming has always been …

FIDO Alliance prepares for industry adoption of strong authentication in 2015

The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …

Insider threats 101: The threat within

Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of …

Why now is the time for enterprises to implement context-based authentication

Security and efficiency are constant concerns in enterprise IT. The popularity of BYOD has been a boon for improved productivity and collaboration, but it has also created a …

Cloud security: Do you know where your data is?

The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …

Big Data analytics to the rescue

In the battle against cyber criminals, the good guys have suffered some heavy losses. We’ve all heard the horror stories about major retailers losing tens of millions of …

Don't miss

Cybersecurity news