Insider threats continue to dominate
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …
96% say ISO 27001 is important for improving security defenses
Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …
Lack of trust is affecting how consumers use the Internet
68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea …
Concerns around endpoint security
The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …
Don’t wait until you’re attacked to take cybersecurity seriously
CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
Visual hacking exposed
While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …
Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
1 billion data records compromised in data breaches
More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …
The limits of prevention-centric security programs
In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …
Phishing attacks increasingly target financial data
28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …
Increase in enterprise cloud adoption and data risk
Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users