Please turn on your JavaScript for this page to function normally.
Three factors will impact enterprise cloud adoption

Although the use of cloud services is growing faster than the overall enterprise IT market, it is still a small part of overall IT spending, according to Gartner. A recent …

Australian organizations are not effectively managing IT risks

The Australian chapters of ISACA highlighted the potential for security breaches and major technology disasters at leading Australian organizations, with 60% of IT …

Would you publicly report a security breach?

Recent research by AlienVault revealed that only 2% of surveyed EU companies would be willing to go public should they suffer a security breach. 38% opted to inform the …

Got malware?

94.7 percent of Americans received at least one email containing a virus, spyware, or malware, according to Halon. About one in eleven (8.8%) opened the attachment and …

The current state of application security

New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …

Compliance and security vulnerabilities are top concerns for POS systems

Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …

How encryption and tokenization help with cloud services adoption

Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …

Mobile security management market to hit billion dollar mark

The Mobile Security Management (MSM) market is emerging as a strong, fledgling submarket of Enterprise Mobility Management (EMM). As Mobile Device Management (MDM) evolves …

Banks risk shattering customer trust

According to Gallup’s 2012 report, “Confidence in Banks,” consumer confidence in U.S. banks hit a record low of 21 percent last year. The …

Analysis of Poison Ivy remote access tool

A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …

The mobile cybercrime landscape is becoming more defined

McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …

Why continuous IT cost optimization is essential

After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …

Don't miss

Cybersecurity news