Please turn on your JavaScript for this page to function normally.
Can you afford to wait 197 days to detect a threat?

Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …

The cybersecurity domino effect

RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …

New domains revive old spam

The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

entrepreneur
Do ethics get in the way of security professionals?

While it’s convenient to think that the information security industry is made up of highly ethical individuals who make the right decision every time, a stressful …

Data breaches lead to surge of spoofing attacks

The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …

Can you correctly identify phishing emails?

An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …

CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Increasing cloud adoption will drive IT innovation

DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Truth
Do you know where your sensitive data lives?

The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …

Workplace stress dramatically impacting IT professionals

High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …

Top cyber attack vectors for critical SAP systems

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …

Don't miss

Cybersecurity news