Please turn on your JavaScript for this page to function normally.
email
Rollout of DMARC email security protocol needs to gain steam

Trust, from both customers and investors, is the most important currency for financial services companies. A breach of trust can break a bank, while maintaining trust leads to …

hand
The rise of InsurTech: How young startups influence a mature industry

Artificial intelligence (AI) and the Internet of Things (IoT) now account for almost half of total investment in insurance technology (InsurTech) startups globally, according …

hand
People are still the biggest security threat to any organization

Despite an increase in spending and investment in deterrence tactics and detection tools, insider threats continue to cause harm to all types of organizations. A new report …

skull
Number of compromised records up 566% in 2016

The number of records compromised grew a historic 566 percent in 2016 from 600 million to more than 4 billion. These leaked records include data cybercriminals have …

Desk
How CIOs are shaping the future of work

IT leaders are poised to make radical changes in the workplace, but boardrooms are holding back progress by continuing to place too much emphasis on reducing costs and keeping …

eye
1.37 billion data records compromised globally in 2016

Gemalto’s Breach Level Index revealed that 1,792 data breaches led to 1.37 billion data records being compromised worldwide during 2016, an increase of 86% compared to …

user
Understanding Europe’s insider threats

35% of employees across the UK, France, Germany and Italy admit to have been involved in a security breach, presenting regional CISOs with a significant challenge when it …

emergency
IT pros spend too much time handling emergencies

A 1E survey of 1,014 IT professionals, who together manage more than 21 million endpoints globally, centered on unplanned activities – how often they occur, what types are …

hard drive
Used devices are a treasure trove of personally identifiable information

40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …

smartphone
Lack of security patching leaves mobile users exposed

An analysis of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than …

healthcare
Healthcare IT pros believe data is safer in the cloud

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer …

PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

Don't miss

Cybersecurity news