Please turn on your JavaScript for this page to function normally.
Spammers are always thinking up new tricks

The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …

Physical location of data will become increasingly irrelevant

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical …

DDoS attacks are becoming more effective

Disruptive cyber-attacks are becoming more effective at breaching security defenses, causing major disruption and sometimes bringing down organizations for whole working days, …

State of the Internet: Trends impacting online business

Akamai Technologies provides insight into key global statistics such as connection speeds, overall attack traffic, network connectivity/availability issues, and traffic …

The unlocked backdoor to healthcare data

The majority of healthcare vendors lack minimum security, which is illuminated by the fact that more than 58% scoring in the “D” grade range for their culture of …

How old are today’s networks?

The percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years, signaling that the global financial crisis of …

Data breaches in 2013 exposed 14% of all debit cards

Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to …

Companies are afraid of the cloud

Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 …

Top 10 technologies for information security in 2014

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …

Are CISOs too confident?

CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority …

Mobile security and incident readiness

AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that …

Who is ultimately responsible for data security in the cloud?

A recent report following Infosecurity Europe 2014 suggested that 43 per cent of organisations had no enterprise visibility or control into whether employees were putting …

Don't miss

Cybersecurity news