Security pros largely unhappy with compliance methods
Despite the fact that 63% consider regulatory compliance to be “very important”, a new Osterman study shows a low satisfaction level with current methods of …
Attackers use reflection techniques for larger DDoS attacks
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification …
Security pros and government failing to collaborate
Infosecurity Europe has today released a new report that provides a snapshot of the industry landscape and the challenges it is currently facing. Having surveyed 1,149 …
SharePoint users are breaching security policies
A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas, has found that at least 36% of SharePoint users are breaching …
Security pros actively hiding negative facts from executives
A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …
The security of the most popular programming languages
A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …
Half of IT pros make undocumented changes to IT systems
57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …
Businesses take little action to mitigate the insider threat
While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …
Growing concerns over data privacy
Almost nine in ten (88%) US consumers are at least “a little” concerned about the privacy of their personal data, according to GfK. One in three consumers also …
52% of enterprises defenseless against cyber attacks
55 % of IT and security professionals have either zero or low visibility of employee behavior, application access and software downloads as they struggle to secure the …
Security still the biggest concern for cloud adoption
IT companies say tighter security tops the list of their clients’ concerns, rating even more important than mobile-device management, support for the cloud and data …
Advanced attackers go undetected for 229 days
A new FireEye report details the tactics used by threat actors to compromise organizations and steal data. It also highlights emerging global threat actors, their suspected …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act