Data breaches lead to surge of spoofing attacks
The number of attacks on businesses is trending up as crimeware tools gain traction providing tools to fraudsters to automate cybercrime attacks leveraging the customer data …
Can you correctly identify phishing emails?
An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …
CIOs are distracted by the business of keeping the lights on
75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …
Increasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Do you know where your sensitive data lives?
The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …
Workplace stress dramatically impacting IT professionals
High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …
Top cyber attack vectors for critical SAP systems
SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …
Criminal attacks in healthcare are up 125% since 2010
The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks—exposing millions of patients and their medical records, according …
Cyber attacks aren’t just targeting big business
81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues.The …
Crimeware infects one-third of computers worldwide
The APWG reports that during the 4th quarter of 2014, a record number of crimeware variants were detected, a strategy of overwhelming proliferation of variations designed to …
The enduring chasm between security teams and developers
The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing …
Data security in the payments ecosystem
Experian Data Breach Resolution and the Ponemon Institute asked professionals to weigh in on several topics including who should be responsible for securing payment systems …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?