Please turn on your JavaScript for this page to function normally.
The value of threat intelligence

When it comes to understanding how a hacker penetrated the corporate network, nearly a quarter (23 percent) had no insight on which channel a breach occurred, according to …

CISOs are looking for more integration and automation

Enterprise CISOs are looking for more integration and automation among their existing IT security tools, and that most are only periodically monitoring and mitigating events …

Fragmented approaches to PKI don’t always follow best practices

Independent research by the Ponemon Institute reveales increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, supporting a growing …

Attackers posing as legitimate insiders still an enormous security risk

Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …

Companies leave vulnerabilities unpatched for up to 120 days

Kenna studied the proliferation of non-targeted attacks and companies’ ability to mitigate these threats through the timely remediation of security vulnerabilities in their …

Women represent only 10% of the infosec workforce

Surveying nearly 14,000 global professionals, a new (ISC)2 report focuses on the lack of gender diversity in the information security workforce despite a cyber landscape that …

File insecurity: the final data leakage frontier

The growth of cloud and mobile computing, the ease at which files can be shared and the diversity of collaboration methods, applications and devices have all contributed to …

Do security flaws with life-threatening implications need alternative disclosure?

If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) …

How to avoid data breaches? Start by addressing human error

Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …

Mobile payments data breaches expected to grow

A survey of 900 cybersecurity experts shows an overwhelming majority (87%) expect an increase in mobile payment data breaches over the next 12 months, yet 42% have used this …

Healthcare industry sees 340% more security incidents than the average industry

Raytheon|Websense examined the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. Healthcare is highly-targeted and …

Quantifiable differences in security performance across industries

BitSight Technologies analyzed Security Ratings of nearly 10,000 organizations in six industries – finance, federal government, retail, energy and utilities, healthcare and …

Don't miss

Cybersecurity news