Please turn on your JavaScript for this page to function normally.
IoT devices are filled with security flaws, researchers warn

We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our …

375 million customer records compromised in 2014

Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …

97% of Global 2000 remain vulnerable to due to Heartbleed

97 percent of Global 2000 organizations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation, according to Venafi. This …

Android ransomware attacks on the increase

CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …

The value of Bring Your Own Identity

New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …

What influences corporate security strategies?

Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …

What is the primary driver for data lakes?

The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner. Several vendors are marketing data lakes as …

How organizations deal with BYOD and mobile security

A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as …

UK application security programs lagging behind US

UK enterprises are lagging behind US enterprises when it comes to application security programs. A new IDG study revealed that on average UK companies are spending …

40% of IT security teams keep executives in the dark

A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …

Are endpoints the most vulnerable part of the network?

Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …

63% of businesses don’t encrypt credit cards

In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …

Don't miss

Cybersecurity news