Please turn on your JavaScript for this page to function normally.
Cost savings drive businesses to the cloud

A survey of C-Level senior executives, developers and other industry delegates has found that 72% of respondents identified cost as the key benefit of using the cloud for the …

Training kids to become infosec superheroes

Children today embark on life in two interconnected worlds, the physical and the virtual. And just as they need to learn how to be smart and safe in the physical world, they …

Cyber attacks impact purchasing behavior

As U.S. consumers head to malls and retail websites this holiday season, they do so increasingly concerned about the safety and security of their personal information. In …

Intel acquires digital identity manager PasswordBox

Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …

Cybersecurity concept for unmanned systems

The University of Virginia School of Engineering and Applied Science Department of Systems and Information Engineering announced the success of an early-stage demonstration to …

118 arrested in action against online fraudsters in the airline sector

On 26 and 27 November, law enforcement agencies from all over the world, in cooperation with the airline, travel and credit card industries, joined forces in a major concerted …

The persistent threat of data breaches

Preventing and managing data breaches have become two of the highest priorities facing businesses today. Many evolving factors such as new threats, regulatory changes and …

Online shoppers are easily duped

A survey by One Poll and Dimensional Research on holiday shopping security practices evaluated online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., and …

If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …

What to expect in the unpredictable world of IT security?

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues …

Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud

Here’s an overview of some of last week’s most interesting news, interviews and articles: Fighting malware, emerging threats and AI Liran Tancman is the CEO of …

How to evaluate national cyber security strategies

ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an …

Don't miss

Cybersecurity news