Does size matter when it comes to cybersecurity?
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …
DDoS attacks now resemble APTs
DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …
IT admin errors that lead to network downtime and data loss
Kroll Ontrack today released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity …
Swift adoption of cloud and mobile drives insider threats
Bitglass surveyed 500 IT and security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months.As more data leaves the network …
Financial impact of SaaS storage breaches now $13.85 million
Elastica analyzed hundreds of millions of enterprise files stored and shared within leading enterprise cloud applications. They identified key trends and insights that reveal …
Massive growth in new ransomware, malware targeting Adobe Flash
“In the first quarter of 2015, McAfee Labs registered a 165 percent increase in new ransomware driven largely by the new, hard-to-detect CTB-Locker ransomware family, a …
90% of DLP violations occur in cloud storage apps
90 percent of data loss prevention (DLP) violations occur in cloud storage apps, and a large percentage of these are for enterprise confidential intellectual property or …
Users care about their privacy, but feel powerless to protect it
Users are resigned to the loss of privacy, but not because they feel they are getting good value for their data, but because they believe marketers will eventually get it …
What’s driving security budgets and technology purchases?
IT security and IT leaders and their staff members do not agree on security objectives, according to findings from a new global Ponemon study.One of the key findings from the …
Social media security is still a low priority
80 percent of IT professionals believe social media is an easy way for hackers to gain access to corporate networks because it is often neglected in terms of security, and …
Most vulnerabilities on enterprise networks are two years old
The NTT Innovation Institute and NTT Group security combined an analysis of over six billion attacks observed in 2014 with an interactive data review and ongoing daily global …
Stagnant budgets and rising insider security threats
A Vectra Networks survey of more than 500 cybersecurity professionals in the Information Security Community on LinkedIn reveals that insider threats are rising, but IT …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users