Please turn on your JavaScript for this page to function normally.
It’s official, corporate passwords are cheap

Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …

User activity monitoring crucial to minimizing security risks

In this ever evolving threat landscape, willing or unwitting insiders often play a key role in security compromises of organizations. It used to be that an …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

Programmer steals US government software source code

A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …

Preventing Good People From Doing Bad Things

As the number of known security breaches seemingly rises exponentially with every passing day, business managers and the general public are becoming increasingly aware of a …

Hacks of Chinese sites either inside jobs or faked

Last week’s news that hacks of a number of high-profile sites resulted in the compromise of personal and financial information of over 100 million Chinese Internet users …

A new perspective on the insider threat

When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Hiding messages in VoIP packets

A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …

Motorola attempted to crush competitor via “Chinese spy ring” allegations

Four years ago a software engineer that worked for Motorola was arrested by U.S. Customs agents as she was trying to board a plane heading for China. Hanjuan Jin was carrying …

Information theft still a serious threat to global business

Fraud remains predominantly an inside job, according to the Kroll Annual Global Fraud Report. The study shows that 60 percent of frauds are committed by insiders, up from 55 …

Don't miss

Cybersecurity news