Please turn on your JavaScript for this page to function normally.
shop online
Magecart presents an unprecedented threat: Here’s what you can do

Recently we learned that the previously disclosed Ticketmaster UK breach from a few weeks ago was not a one-off event but instead part of a widespread website digital credit …

EU
Only 20% of companies have fully completed their GDPR implementations

Key findings from a survey conducted by Dimensional Research highlight that only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation …

industry
An overview of the OT/ICS landscape for cyber professionals

Most cyber security professionals take for granted the information technology or IT nature of their work. That is, when designing cyber protections for some target …

GDPR
Want to avoid GDPR fines? Adjust your IT procurement methods

Gartner said many organizations are still not compliant with GDPR legislation even though it has been in force since May 2018. This is because they have not properly audited …

IoT
IoT security spend to reach $6 billion by 2023

A new study from Juniper Research found that spending on IoT cybersecurity solutions is set to reach over $6 billion globally by 2023. It highlighted rapid growth, with …

building
Threats financial organizations will face in 2019

What type of threats will financial services and banking organizations face in 2019? According to IntSights Cyber Intelligence, they should be prepared for breaches effected …

chess
Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 years

When I asked Dr. Giovanni Vigna what are some of the most important lessons he has learned during the 25+ years he spent working in computer security, his answer was simple: …

money
Cost of data breaches rises, mega breaches cost up to $350 million

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, …

magnifying glass
Hacker-powered security is reaching critical mass

HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 …

talk
Do advances in voice technology pose a threat to enterprise security?

A new study from Aeriandi has highlighted UK organisations’ contradictory attitudes towards the voice channel, increasing the chances of their customers’, employees’ and …

healthcare
Innovation in healthcare: A hacker’s dream and CISO’s nightmare?

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the …

handshake
Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget

With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and …

Don't miss

Cybersecurity news