
The dismal state of payment data security
With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their …

Top drivers of investment in forensic data analytics
Cyber breaches and insider threats, which include malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks according to executives and are …

Threats to the critical information infrastructure on the rise
Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …

The corporate risk factor disclosure landscape
Corporate risks disclosed by public companies in SEC filings often are generic and do not provide investors with clear, concise and insightful information that is …

Organizations are spending ineffectively to prevent data breaches
A new report by 451 Research, which polled 1,100 senior IT security executives at large enterprises worldwide, details rates of data breach and compliance failures, …

Security to become primary reason government agencies move to the cloud
Public cloud options now offer the scalability, computing power, storage and security to better enable digital government platforms and meet rising expectations for …

Exposing the shadow data threat
Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …

Industrialized attackers systematically destroy defender confidence
Only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns, according to …

Rise of automation: Battle of the bots
As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

Businesses fail to take full advantage of encryption technology
Private, highly-sensitive employee information, including banking details, HR files and personal healthcare records, is at risk. While many companies take the security of …

Unexpected implications arising from the Internet of Things
More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Success of the Internet of Things depends on privacy and security
Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless