Please turn on your JavaScript for this page to function normally.
8 key cybersecurity deficiencies and how to combat them

While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …

Employee behaviors expose organizations to insider threat

A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …

Fraud study finds MasterCard holding lowest fraud rate

2Checkout released a study of online payments fraud, based on a worldwide sample of approximately one million payment transactions tracked each quarter. Key findings: Discover …

Ineffective password security practices plague organizations

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, according to Lieberman Software. …

The cloud will transform the airport experience

Airports are increasingly identifying the need to switch to cloud systems in order to improve operational efficiencies, according to Amadeus, who collected the viewpoints of …

Large increase in PayPal-related phishing URLs

CYREN published its April 2014 Internet Threats Trend Report. Among its findings, they revealed a 73 percent increase in the number of phishing attacks aimed at PayPal users. …

What is the key to IT program management?

The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …

Trust in the U.S. cloud on the decline

Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …

What are the biggest risks with the Internet of Things?

The majority of small businesses in the U.S. (82 percent) believe the Internet of Things (IoT) will bring fresh opportunities for their business, according to a new study …

More enterprises to adopt multi-factor authentication

Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …

Hybrid cloud computing success factors

In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …

Company and employee disconnect on BYOD security policies

Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …

Don't miss

Cybersecurity news