Please turn on your JavaScript for this page to function normally.
How directors manage today’s key challenges

A nationwide survey of nearly 500 directors highlighted that daily risk oversight continues to be one of the central challenges facing boards, as well as an increased focus on …

Firewall: The king of network security

A new FireMon report, based on a survey of over 700 network security practitioners, reveals that firewalls remain highly strategic to organizations’ current and future …

Global experiment exposes the dangers of using Wi-Fi hotspots

A global Wi-Fi hacking experiment exposed major security issues regarding the browsing habits of users around the globe. Avast mobile security experts traveled to cities in …

Security threats and the retail industry

Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are …

A threat assessment of 7 million iOS and Android apps

Android malware is growing more pervasive, and iOS devices are also increasingly at risk. FireEye analyzed seven million mobile apps on both Android and iOS platforms from …

The shift to secure apps in the enterprise

As enterprises are mobilizing content and apps, they are also fortifying their cyber resiliency with accelerated activations of secure mobile apps, which grew 65 percent …

Medical identity theft affected two million victims in 2014

The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013. In the five …

The business and social impacts of cyber security issues

With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as …

Companies expects others to protect them against DDoS attacks

One in five businesses surveyed believe that their online services should be protected against DDoS attacks by their IT service providers (in particular, network providers). …

Known weaknesses plague the security threat landscape

Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …

Addressing cybersecurity business disruption attacks

Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …

Internet of Things adoption is gaining momentum

Enterprise adoption of the Internet of Things (IoT) is starting to gain momentum, fueled by a mix of technological, political and social factors. The declining costs of …

Don't miss

Cybersecurity news