IoT devices are filled with security flaws, researchers warn
We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our …
375 million customer records compromised in 2014
Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …
97% of Global 2000 remain vulnerable to due to Heartbleed
97 percent of Global 2000 organizations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation, according to Venafi. This …
Android ransomware attacks on the increase
CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …
The value of Bring Your Own Identity
New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …
What influences corporate security strategies?
Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …
What is the primary driver for data lakes?
The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner. Several vendors are marketing data lakes as …
How organizations deal with BYOD and mobile security
A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as …
UK application security programs lagging behind US
UK enterprises are lagging behind US enterprises when it comes to application security programs. A new IDG study revealed that on average UK companies are spending …
40% of IT security teams keep executives in the dark
A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
63% of businesses don’t encrypt credit cards
In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users