Encryption use continues to grow
Use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber attacks and yet there are still major challenges in …
Governments unprepared for the impact of the big five IT trends
A new MeriTalk study, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud …
Mobility is the weakest security link
Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …
What do government security pros think?
Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …
Trends in web application security
Despite web application vendors being more responsive and releasing security patches much faster than in 2012, new research revealed that it is still taking an average of over …
Adults admit logging into their partners social media accounts
New research reveals that one in four Brits will be sending a saucy message or photo to their other half. However, lovers might want to think twice before hitting send on …
Insecure file sharing puts corporate data at risk
Personal email could be 2014’s biggest threat to corporate data. A new survey of more than 500 professionals by Globalscape found that in the past 12 months, 63 percent …
Lack of skills hindering appsec programs
An ongoing shortage of skills in application security is severely hampering the implementation of effective Appsec programs, according to SANS. The 2014 Application Security …
DDoS attacks used to influence stock prices
Prolexic Technologies shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values …
Most adults share intimate info via unsecured digital devices
McAfee examined how more than 1,500 consumers are sharing and storing intimate data on their mobile devices, especially with current or former significant others. Sharing …
USA still the global spam king
SophosLabs revealed the Dirty Dozen top spam-relaying nations, as it published the final “Spampionship” league table of 2013. Once again, it was the USA which …
By 2016, 30% of organizations will use biometric authentication on mobile devices
The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple …
Featured news
Sponsored
Don't miss
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update