Please turn on your JavaScript for this page to function normally.
Would you publicly report a security breach?

Recent research by AlienVault revealed that only 2% of surveyed EU companies would be willing to go public should they suffer a security breach. 38% opted to inform the …

Got malware?

94.7 percent of Americans received at least one email containing a virus, spyware, or malware, according to Halon. About one in eleven (8.8%) opened the attachment and …

The current state of application security

New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …

Compliance and security vulnerabilities are top concerns for POS systems

Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …

How encryption and tokenization help with cloud services adoption

Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …

Mobile security management market to hit billion dollar mark

The Mobile Security Management (MSM) market is emerging as a strong, fledgling submarket of Enterprise Mobility Management (EMM). As Mobile Device Management (MDM) evolves …

Banks risk shattering customer trust

According to Gallup’s 2012 report, “Confidence in Banks,” consumer confidence in U.S. banks hit a record low of 21 percent last year. The …

Analysis of Poison Ivy remote access tool

A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …

The mobile cybercrime landscape is becoming more defined

McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …

Why continuous IT cost optimization is essential

After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …

ENISA analyzes major security incidents in the EU

The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …

Is the hybrid cloud the future for enterprises?

While the public cloud remains important to IT decision-makers at UK and US enterprises, the limitations of using this type of platform as a one-size-fits-all solution are …

Don't miss

Cybersecurity news