Please turn on your JavaScript for this page to function normally.
danger
Sophisticated keyloggers target the finance industry

Lastline found three separate strains of keylogger malware that are currently targeting finance. Lastline’s analysis of the 100 most recent malware samples found among finance …

laptop
The harsh realities of endpoint management

88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have. LogMeIn released findings of a new global …

London
UK businesses overlook external providers when developing cyber strategies

Large businesses in the UK could be falling short when it comes to assessing the cyber resilience of external providers within their supply chain network, according to new …

lock
Cybersecurity: A core component of digital transformation

In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …

DevSecOps
DevSecOps is maturing, 62% of organizations have a team in place

During RSA Conference 2018, Aqua Security surveyed 80 security professionals to gain their unfiltered, high-level perspective on the fast-emerging discipline of DevSecOps. …

question
To pay hackers’ ransom demands or to invest in more security?

One third of global business decision makers report that their organization would try to cut costs by paying a ransom demand from a hacker rather than invest in information …

Android apps
Cryptomining apps are on the rise, malicious apps in app stores decline

RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the …

city
Smart cities: New threats and opportunities

As smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent …

risk
Quantifying cyber exposure: Attackers are racing ahead

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …

abstract
CIOs are forced to compromise between faster innovation and perfectly working software

An independent global survey of 800 CIOs revealed that 73% of organizations say the need for speed in digital innovation is putting customer experience at risk. The study …

Bitcoin
How security pros see the future of cryptocurrencies and cryptomining

Data gathered by Lastline at RSA Conference 2018 reveals security professionals’ perspectives on the future of cryptocurrencies and cryptomining, response to ransomware …

bomb
Fraud data shows 680% spike in fraudulent mobile app transactions

The number of fraudulent transactions originating from a mobile app during the first quarter has increased by 200 per cent since 2015, according to RSA Security. Analysis from …

Don't miss

Cybersecurity news