Please turn on your JavaScript for this page to function normally.
SANS revamps its Memory Analysis Course

To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete …

Half of IT pros make undocumented changes to IT systems

57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …

Businesses take little action to mitigate the insider threat

While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …

The insider threat is growing

Vormetric and Ovum surveyed more than 500 IT decision-makers at mid and large size organizations in the UK, France and Germany. They found that only nine percent of businesses …

800M exposed records make 2013 record year for data breaches

Despite oft repeated claims that the insider threat is the one organizations should be looking out for, the numbers and statistics related to 2013 data breaches show that risk …

20M South Koreans affected by insider data theft

Personal and financial information of some 20 million South Koreans has been compromised by a consultant working for personal credit ratings firm Korea Credit Bureau (KCB), …

Financial services cyber security trends for 2014

Five years ago, questions directed at boards of directors and senior executives at financial services firms on the toughest risk management issues might have resulted in …

Over 80% of employees use unauthorized apps at work

More than 80 percent of employees admit to using non-approved SaaS applications in their jobs, say the results of a McAfee survey. But what’s even more interesting is …

Experts offer cyber security forecast for the year ahead

Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …

Open source crypto server for thwarting malicious insiders

Edward Snowden’s successful exfiltration of mountains of data from NSA systems and databases has once more put the spotlight back on the threat that insiders pose to …

The enemy within

Recent high-profile cases in the press have called attention to the threat the trusted insider can pose to the security of an organization. A recent survey highlighted that …

Unapproved cloud products put company data at risk

Egnyte released results from a new survey by Harris Interactive among 2,020 U.S. adults illustrates a major exposure for today’s businesses when it comes to the transfer …

Don't miss

Cybersecurity news