Please turn on your JavaScript for this page to function normally.
Insider threats continue to dominate

Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider …

96% say ISO 27001 is important for improving security defenses

Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …

Lack of trust is affecting how consumers use the Internet

68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea …

Concerns around endpoint security

The overwhelming majority of information security professionals believe end users are their biggest security headache, largely due to their tendency to click on suspicious and …

Don’t wait until you’re attacked to take cybersecurity seriously

CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …

Cyber readiness across government and critical infrastructure industries

While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …

Visual hacking exposed

While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to capture sensitive, …

Endpoint security becoming critical focus area

Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …

1 billion data records compromised in data breaches

More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …

The limits of prevention-centric security programs

In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …

Phishing attacks increasingly target financial data

28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …

Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

Don't miss

Cybersecurity news