RSA Conference attendees ambivalent about NSA tactics
Thycotic Software announced the results of a survey of 341 RSA Conference USA 2014 attendees, which found that fewer than half (48%) of pollees feel the NSA overstepped its …
Third-party programs responsible for 76% of vulnerabilities in popular software
Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia’s Vulnerability Review …
Consumers want privacy, but don’t take advantage of opt-out technologies
A majority of consumers worry about how marketers use their personal data, but 79 percent are more likely to provide personal information to what they consider a …
97% of SaaS vendors use SAML-based single sign-on
OneLogin and the Cloud Security Alliance today announced findings from their OneLogin 2014 State of SaaS Identity Management survey, which was conducted to better understand …
Nearly half of companies assume they have been compromised
A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS …
The growth and complexity of mobile threats
As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …
Despite costs, organizations overlook new threats
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
60% of enterprises relying on sysadmins to self-police SSH keys
Enterprises tolerate security vulnerabilities by allowing open door, root-level access, according to a new Ponemon Institute report. 46% of the 1,854 respondents reported …
400 iOS and Android apps analyzed for privacy and security risks
A new report analyzes the behaviors of the top 400 iOS and Android apps to assess the state of mobile app security and identify trends impacting consumers and enterprises with …
Lessons learned from blocking 100 million cyber attacks
Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, they produced a Superfecta report which contains a quarter-by-quarter guide …