The security of the most popular programming languages
A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …
Half of IT pros make undocumented changes to IT systems
57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …
Businesses take little action to mitigate the insider threat
While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …
Growing concerns over data privacy
Almost nine in ten (88%) US consumers are at least “a little” concerned about the privacy of their personal data, according to GfK. One in three consumers also …
52% of enterprises defenseless against cyber attacks
55 % of IT and security professionals have either zero or low visibility of employee behavior, application access and software downloads as they struggle to secure the …
Security still the biggest concern for cloud adoption
IT companies say tighter security tops the list of their clients’ concerns, rating even more important than mobile-device management, support for the cloud and data …
Advanced attackers go undetected for 229 days
A new FireEye report details the tactics used by threat actors to compromise organizations and steal data. It also highlights emerging global threat actors, their suspected …
Most cloud services are putting businesses at risk
A new Skyhigh Networks report analyzes usage data from more than one million users across more than 40 companies spanning the financial services, healthcare, high technology, …
The state of remote access security
At the end of 2013, HOB conducted a survey of more than 200 CIOs and CTOs in the U.S. The survey quantified the trends and challenges IT decision makers experience when …
The digital universe will reach 44 trillion gigabytes by 2020
A new EMC study reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the …
Breaches expose 552 million identities in 2013
After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security …
Email management lacks innovation, businesses turn to cloud
SolarWinds released survey results highlighting the growing challenge organizations face managing email in an increasingly complex environment where BYOx, mobility and other …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users