Please turn on your JavaScript for this page to function normally.
Internet of Everything attack surface grows

The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …

What IT skills are in demand?

More than 11,000 IT and business professionals in North America responded to the eighth annual IT Skills and Salary Survey by Global Knowledge and Windows IT Pro. Key …

Perception and reality of perimeter security effectiveness

A widening gap is emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing …

RSA Conference 2015
Lack of skilled infosec pros creates high-risk environments

82 percent of organizations expect to be attacked in 2015, but they are relying on a talent pool they view as largely unqualified and unable to handle complex threats or …

Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

Compromised credentials haunt cloud app usage

Netskope found that more than seven out of ten uploads from users with compromised accounts are to apps with a “poor” rating in the Netskope Cloud Confidence …

Main sources of data breaches: Phishing, RAM scrapers, web app insecurity

US telecom giant Verizon has published its 2015 Data Breach Investigations Report, which is based on an analysis of nearly 80,000 security incidents, including more than 2,100 …

Attackers use deceptive tactics to dominate corporate networks

Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec. …

The key challenges to timely incident response

Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …

A look at emergent threats and their influence

Analyzing Dell data sources and the 2014 threat landscape, their new report found a surge in point-of-sale (POS) malware, increased malware traffic within encrypted (https) …

Cloud security: CA conducts advanced research

CA Labs is conducting research and development for innovative solutions to address security challenges in multi-cloud environments. Horizon 2020 awarded a contract to the …

Are privileged users the most dangerous insider?

92 percent of healthcare IT decision makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49 percent felt very or extremely …

Don't miss

Cybersecurity news