Please turn on your JavaScript for this page to function normally.
Nearly 50% have been a victim of a data breach

RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security. Surveying more than 1,000 consumers …

227,747 new malware samples are created daily

The growth of malware appears unstoppable. In total, some 20 million new strains were created worldwide in the third quarter of the year, at a rate of 227,747 new samples …

Targeted attacks around the globe will escalate

Experts from Trend Micro believe that targeted attacks campaigns will continue to multiply in 2015, after cybercriminals had noteworthy breaches via targeted attacks in the …

Risky file sharing practices can cause data loss and compliance violations

Organizational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and that employees routinely breach IT …

The psychology of Facebook scam victims

A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …

Three branches of security: Strengthening your posture with checks and balances

With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …

When to use tools for ISO 27001/ISO 22301 and when to avoid them

If you’re starting to implement complex standards like ISO 27001 or ISO 22301, you’re probably looking for a way to make your job easier. Who wouldn’t? After …

Targeting security weaknesses in the phone channel

Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …

Week in review: Critical Drupal 7 vulnerability, cloud myths, Ebola scams

Here’s an overview of some of last week’s most interesting news and articles: Tor exit node found patching downloaded binaries with malware A researcher has …

Things that freak out IT security pros

Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware …

SIEM doesn’t reduce security incidents, say IT pros

A survey of IT professional has shown that most organisations don’t audit their IT infrastructures and those that do don’t have complete details of who changed …

The security threat of unsanctioned file sharing

Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies …

Don't miss

Cybersecurity news