Please turn on your JavaScript for this page to function normally.
payment data security
The dismal state of payment data security

With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their …

euro
Top drivers of investment in forensic data analytics

Cyber breaches and insider threats, which include malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks according to executives and are …

industry
Threats to the critical information infrastructure on the rise

Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …

corporate
The corporate risk factor disclosure landscape

Corporate risks disclosed by public companies in SEC filings often are generic and do not provide investors with clear, concise and insightful information that is …

money
Organizations are spending ineffectively to prevent data breaches

A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Cloud
Security to become primary reason government agencies move to the cloud

Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

shadow
Exposing the shadow data threat

Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

flames
Industrialized attackers systematically destroy defender confidence

Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …

robot
Rise of automation: Battle of the bots

As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

lock
Businesses fail to take full advantage of encryption technology

Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …

Internet
Unexpected implications arising from the Internet of Things

More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Library
Success of the Internet of Things depends on privacy and security

Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …

Don't miss

Cybersecurity news