Please turn on your JavaScript for this page to function normally.
lock
Cyber resiliency: Risks organizations take every day

77 percent of respondents to a study conducted by Ponemon Institute admit they do not have a formal cyber security incident response plan (CSIRP) applied consistently across …

money
Global business spend on cybersecurity to grow 33% over the next 4 years

New data from Juniper Research has found that global business spend on cybersecurity solutions will grow by 33% over the next 4 years, reaching $134 billion annually by 2022. …

wireless
Four wireless standards hackers will target after Wi-Fi

When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …

healthcare
Healthcare industry: Attacks outpacing investments in personnel, education and resources

Recognizing that healthcare organizations are facing constant cyber attacks, the 2018 Impact of Cyber Insecurity on Healthcare Organizations study examines the myriad of …

bomb
Record surges in healthcare attacks, fileless malware, cryptocurrency mining

During Q4 2017, McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 …

world
Global SOC maturity improves, yet some still operate with serious gaps in security

Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …

hands
Organizations are not doing enough to protect data privacy

In today’s data-driven society, privacy, security and trust are more vital and intertwined than ever before. But many organisations are not doing all they can to protect data …

city
Infrastructure security: Don’t just sit there, do something!

Around 4am on March 28, 1979, things started to go badly wrong deep inside the bowels of reactor number two at Three Mile Island. Routine maintenance to clear a blockage …

cloud
Cloud access management is integral to adopting cloud applications

The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …

sharing
Intelligence sharing is crucial in the fight against cybercrime

Malware variants previously focused on the financial sector are now successfully attacking non-banking targets, according to Blueliv. A higher level of collaboration and …

cloud
The driving force of cloud security investments

A new Netwrix report supplements the 2018 Netwrix Cloud Security Report, unveiling survey findings specific to various industries and regions. Overall, 853 organizations …

Phishing
Most top US higher ed institutions fail to protect students from phishing

88.8 percent of the root domains operated by top colleges and universities in the United States are putting their students, staff and other recipients at risk for phishing …

Don't miss

Cybersecurity news