
Insight into critical data remains limited
SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

Security concerns limit business initiatives
Though the C-suite recognizes the benefits of data security, organizations are still struggling to develop programs that effectively incorporate security strategies without …

Corruption: The magnitude of risk
40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the …

UK businesses fail at security awareness
UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and …

How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …

Cybersecurity still seen as a tech issue, not a business imperative
Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According …

Most infosec pros consider government-mandated encryption backdoors a bad idea
Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

Companies are realizing that security and privacy go hand in hand
50 percent of companies over the past two years have increased the involvement of privacy professionals on their information security teams to enhance the prevention of data …

Top 12 cloud computing threats in 2016
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an …

Are CIOs wasting millions on infosec that doesn’t work?
There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving …

Not all data breaches are created equal
1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

8 in 10 IT pros believe believe their data is safer in the cloud
Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless