Mirko Zorz
Total cost of average data breach reaches $3.8 million
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.The study also found that …
The importance of encryption and key management for security practitioners
In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how if you’re going to do encryption, make sure you do it …
DDoS attacks double, old web application attack vectors still active
Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.A surge in DDoS attack …
Global black markets and the underground economy
Adam Tyler is the Chief Innovative Officer at CSID. In this interview he discusses global black markets, what type of information is most valuable for cybercriminals, modern …
Strengthening trust in a highly connected world
As consumers, we increasingly expect anytime-anywhere access and personalized service, whether online at home, on-the-go with mobile devices, or in a store or branch location. …
Product spotlight: Qualys Continuous Monitoring
Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an …
Do ethics get in the way of security professionals?
While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …
Data breaches lead to surge of spoofing attacks
The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …
Total data protection outside the firewall
Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to …
Why WinSCP became an open source classic
If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …
Why saying YES is changing information security
In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how the information security is a very different place than 5-10 …
Product spotlight: Entrust IdentityGuard
All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities. …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA