Please turn on your JavaScript for this page to function normally.
Concerns around endpoint security

The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …

Don’t wait until you’re attacked to take cybersecurity seriously

CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …

Cyber readiness across government and critical infrastructure industries

While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …

Visual hacking exposed

While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …

Endpoint security becoming critical focus area

Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …

1 billion data records compromised in data breaches

More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …

The limits of prevention-centric security programs

In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …

Phishing attacks increasingly target financial data

28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …

Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

Dangerous vulnerabilities plague IoT home security systems

Owners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home …

Unsurprisingly, adults don’t read terms and conditions of mobile apps

Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …

Security now one of the top risks for business leaders worldwide

Cybersecurity has come to the forefront of risk oversight for board members and C-suite executives, according to results of a survey of business executives by Protiviti and …

Don't miss

Cybersecurity news