Please turn on your JavaScript for this page to function normally.
PCI compliance contributes to false sense of security

Despite industry data to the contrary, a new Tripwire retail cybersecurity survey indicates that organizations that rely on PCI compliance as the core of their information …

PC gamers increasingly under attack

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …

Looking at insider threats from the outside

Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …

375 million customer records compromised in 2014

Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …

6 best practices to assure PCI compliance

With recent PCI DSS compliance incidents costing companies millions of pounds in fines and losses and inflicting damage to valuable brand reputations, Netwrix is urging …

97% of Global 2000 remain vulnerable to due to Heartbleed

97 percent of Global 2000 organizations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation, according to Venafi. This …

Continuous monitoring for enterprise incident response

Qualys has further bolstered its Continuous Monitoring (CM) cloud service. The latest features include automated alerts for changes in perimeter IP addresses, as well as a new …

Android Fake ID bug allows malware to impersonate trusted apps

The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …

Using Hollywood to improve your security program

I spend a lot of time on airplanes, and end up watching a lot of movies. Some of my favorite movies are adventures, spy stuff, and cunning heist movies. Recently, I realized …

Android ransomware attacks on the increase

CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …

Layered security in the cloud

When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. …

The value of Bring Your Own Identity

New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …

Don't miss

Cybersecurity news