
Privacy pros gaining control of technology decision-making over IT
TrustArc and IAPP announced the results of new research that examined how privacy technology is bought and deployed to address privacy and data protection challenges. …

Retail data breaches continue to reach new highs
Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the …

Inside look at lifecycle of stolen credentials and extent of data breach damage
Shape Security released its Credential Spill Report, shedding light on the extent to which the consumer banking, retail, airline and hospitality industries are impacted by …

Attention all passengers: Airport networks are putting you at risk!
Coronet released a report identifying San Diego International Airport, John Wayne Airport-Orange County (CA) International Airport and Houston’s William P. Hobby International …

Many infosec professionals reuse passwords across multiple accounts
Lastline announced the results of a survey conducted at Infosecurity Europe 2018, which suggests that 45 percent of infosec professionals reuse passwords across multiple user …

26,000 electronic devices are lost on London Transport in one year
Commuters lost over 26,000 electronic devices on London’s Transport for London (TFL) network last year, new research from the think tank Parliament Street has revealed. The …

Most executives trust cloud-based systems to keep account payables secure
WEX released the results of a third-party survey to gauge views of the payments-processing ecosystem from chief financial officers and senior financial executives across the …

86% of enterprises have adopted a multi-cloud strategy
Based on a global survey of 727 cloud technology decision makers at businesses with more than 1,000 employees, Forrester Consulting found how shifting business priorities are …

Cost of data breaches rises, mega breaches cost up to $350 million
Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, …

Hacker-powered security is reaching critical mass
HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 …

How the access control market has developed and should direct itself in the coming years
Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …

Do advances in voice technology pose a threat to enterprise security?
A new study from Aeriandi has highlighted UK organisations’ contradictory attitudes towards the voice channel, increasing the chances of their customers’, employees’ and …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?