Please turn on your JavaScript for this page to function normally.
Is your company ready for a big data breach?

Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …

Analysis of 5 million scans on 53 million hosts

Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …

Remote users expose companies to cybercrime

Results of new remote access security research show half of companies with a remote workforce had their websites compromised in 2012, over a third had passwords hacked, and …

Data thieves and their motives

Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …

Dangerous CSRF attacks up 132%

FireHost has announced today its Q1 2013 web application attack statistics, detailing the type and number of the most dangerous cyberattacks blocked by the firewalls that …

The importance of crowd-sourced threat intelligence

Imperva analyzed real-world attack traffic against 60 web applications between January and March 2013 to identify common attack patterns. Businesses can reduce the risk of …

Big data, analytics, and cloud drive software growth

For 2012, the worldwide software market grew 3.6% year over year reaching a total market size of $342 billion, according to IDC. 2012 confirms the beginning of a more …

Reliance on passwords inhibits online business

A new study by the Ponemon Institute takes a deep dive into consumer perceptions around how organizations are securing their access, and what they would consider to be the …

Research reveals damage that privacy breaches can cause

A global study of consumer attitudes towards company stewardship of personal data conducted by the Economist Intelligence Unit shows that data breaches can cause major damage …

Insider threats and BYOD still a great problem

Insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches, according to …

Big data drives big demand for storage

As demand for Big Data technology and services continues to escalate, all levels of the Big Data technology stack will experience significant growth. Storage is a critical …

Targeted attacks hitting small business have increased threefold

Based on data from the company’s own Global Intelligence Network, Symantec analysts have shared in annual Internet Security Threat Report that there was a 42 percent …

Don't miss

Cybersecurity news