Opportunities and challenges for CIOs in different industries
CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …
Why endpoint backup is critical
Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …
Malware creation breaks all records! 160,000 new samples every day
Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …
Healthcare industry lags in security effectiveness
BitSight analyzed Security Ratings for S&P 500 companies in four industries – finance, utilities, retail and healthcare and pharmaceuticals. The objective was to …
Misconfiguration to blame for most mobile security breaches
Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …
8 key cybersecurity deficiencies and how to combat them
While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …
Employee behaviors expose organizations to insider threat
A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …
Fraud study finds MasterCard holding lowest fraud rate
2Checkout released a study of online payments fraud, based on a worldwide sample of approximately one million payment transactions tracked each quarter. Key findings: Discover …
Ineffective password security practices plague organizations
Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, according to Lieberman Software. …
The cloud will transform the airport experience
Airports are increasingly identifying the need to switch to cloud systems in order to improve operational efficiencies, according to Amadeus, who collected the viewpoints of …
Large increase in PayPal-related phishing URLs
CYREN published its April 2014 Internet Threats Trend Report. Among its findings, they revealed a 73 percent increase in the number of phishing attacks aimed at PayPal users. …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users