Please turn on your JavaScript for this page to function normally.
Encryption use continues to grow

Use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber attacks and yet there are still major challenges in …

Governments unprepared for the impact of the big five IT trends

A new MeriTalk study, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud …

Mobility is the weakest security link

Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …

What do government security pros think?

Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …

Trends in web application security

Despite web application vendors being more responsive and releasing security patches much faster than in 2012, new research revealed that it is still taking an average of over …

Adults admit logging into their partners social media accounts

New research reveals that one in four Brits will be sending a saucy message or photo to their other half. However, lovers might want to think twice before hitting send on …

Insecure file sharing puts corporate data at risk

Personal email could be 2014’s biggest threat to corporate data. A new survey of more than 500 professionals by Globalscape found that in the past 12 months, 63 percent …

Lack of skills hindering appsec programs

An ongoing shortage of skills in application security is severely hampering the implementation of effective Appsec programs, according to SANS. The 2014 Application Security …

DDoS attacks used to influence stock prices

Prolexic Technologies shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values …

Most adults share intimate info via unsecured digital devices

McAfee examined how more than 1,500 consumers are sharing and storing intimate data on their mobile devices, especially with current or former significant others. Sharing …

USA still the global spam king

SophosLabs revealed the Dirty Dozen top spam-relaying nations, as it published the final “Spampionship” league table of 2013. Once again, it was the USA which …

By 2016, 30% of organizations will use biometric authentication on mobile devices

The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple …

Don't miss

Cybersecurity news