CIOs agree, IT is more complex than ever
Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to Trustmarque. The research has revealed that cloud computing (66%), legacy technology (51%) …
How are businesses responding to cyber risks?
Year after year, cyberattacks continue to escalate in frequency, severity and impact. However, prevention, detection methods and cybersecurity innovation are on the rise as …
The impact of digital business on information security
Changes in computing fabric, devices and services formed by digital business continue to shape risk and security landscapes, according to Gartner. By year-end 2017, more than …
How attackers attempt to infect organizations
A new report by Palo Alto Networks, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical …
High prevalence of personal health information at risk
The healthcare and life sciences vertical is responsible for 76.2 percent of all cloud data loss prevention (DLP) policy violations among the billions of total app instances …
It’s not just about Big Data, it’s what you do with it
Worldwide IT spending is forecast to surpass $3.6 trillion in 2016, a 1.5 percent increase from 2015, according to Gartner, Inc. The IT industry is being driven by digital …
Attackers prefer lower-bandwidth DDoS attacks
Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade …
Cybersecurity is being taken seriously around the globe
There has been a dramatic increase in the attention that boards and executives are paying to cybersecurity risk management, according to a new global study developed by the …
Is your board ready for a security incident?
Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …
Prevention is the best cure for identity theft
In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …
The changing role of the risk manager
71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …
Exposing fraud behavior patterns associated with compromised identities
Timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities, according to ID:A Labs.Understanding fraud …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it