Please turn on your JavaScript for this page to function normally.
CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Man charged with attempted spear-phishing attack on U.S. Department of Energy

An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …

Increasing cloud adoption will drive IT innovation

DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Truth
Do you know where your sensitive data lives?

The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …

Defend your network from APTs that exploit DNS

Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the …

IoT and the great data heist

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …

Data privacy endangered by international trade agreements

You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …

Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …

How long is the wait?

Does this question sound familiar? You have probably asked this question several times. Nobody likes to wait. But yet, we wait at restaurants, to see the doctor, and to get …

BalaBit updates Shell Control Box

BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …

Risk IT and services spending to reach $78.6 Billion in 2015

According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …

Workplace stress dramatically impacting IT professionals

High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools