Please turn on your JavaScript for this page to function normally.
industry
Threats to the critical information infrastructure on the rise

Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …

corporate
The corporate risk factor disclosure landscape

Corporate risks disclosed by public companies in SEC filings often are generic and do not provide investors with clear, concise and insightful information that is …

money
Organizations are spending ineffectively to prevent data breaches

A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Cloud
Security to become primary reason government agencies move to the cloud

Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

shadow
Exposing the shadow data threat

Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

flames
Industrialized attackers systematically destroy defender confidence

Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …

robot
Rise of automation: Battle of the bots

As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

lock
Businesses fail to take full advantage of encryption technology

Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …

Internet
Unexpected implications arising from the Internet of Things

More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Library
Success of the Internet of Things depends on privacy and security

Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …

password
Compromised credentials a leading concern for most security pros

90% of organizations are worried about compromised credentials, though 60% say they cannot catch these types of attacks today, according to a new survey by Rapid7. 62% of …

justice sentence gavel law court
Why the legal sector is risking confidential information

The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …

Don't miss

Cybersecurity news