Cybersecurity concerns becoming a boardroom issue
The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …
Major gaps found in the governance of emerging technologies
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …
73% of companies are unprepared for disaster recovery
The Disaster Recovery Preparedness (DRP) Council announced findings from its benchmark study which show that 73% of respondent organizations worldwide are not taking adequate …
Scammers turn to Facebook for targeting
Scammers are increasingly taking advantage of Facebook targeting tools and user trust to push cheap pharmaceuticals, designer replicas and other products in a trend …
Trends shaping mobile forensics in 2014
Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …
RSA Conference attendees ambivalent about NSA tactics
Thycotic Software announced the results of a survey of 341 RSA Conference USA 2014 attendees, which found that fewer than half (48%) of pollees feel the NSA overstepped its …
Third-party programs responsible for 76% of vulnerabilities in popular software
Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia’s Vulnerability Review …
Consumers want privacy, but don’t take advantage of opt-out technologies
A majority of consumers worry about how marketers use their personal data, but 79 percent are more likely to provide personal information to what they consider a …
97% of SaaS vendors use SAML-based single sign-on
OneLogin and the Cloud Security Alliance today announced findings from their OneLogin 2014 State of SaaS Identity Management survey, which was conducted to better understand …
Nearly half of companies assume they have been compromised
A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS …
The growth and complexity of mobile threats
As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …
Despite costs, organizations overlook new threats
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users