Three factors will impact enterprise cloud adoption
Although the use of cloud services is growing faster than the overall enterprise IT market, it is still a small part of overall IT spending, according to Gartner. A recent …
Australian organizations are not effectively managing IT risks
The Australian chapters of ISACA highlighted the potential for security breaches and major technology disasters at leading Australian organizations, with 60% of IT …
Would you publicly report a security breach?
Recent research by AlienVault revealed that only 2% of surveyed EU companies would be willing to go public should they suffer a security breach. 38% opted to inform the …
Got malware?
94.7 percent of Americans received at least one email containing a virus, spyware, or malware, according to Halon. About one in eleven (8.8%) opened the attachment and …
The current state of application security
New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …
Compliance and security vulnerabilities are top concerns for POS systems
Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …
How encryption and tokenization help with cloud services adoption
Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …
Mobile security management market to hit billion dollar mark
The Mobile Security Management (MSM) market is emerging as a strong, fledgling submarket of Enterprise Mobility Management (EMM). As Mobile Device Management (MDM) evolves …
Banks risk shattering customer trust
According to Gallup’s 2012 report, “Confidence in Banks,” consumer confidence in U.S. banks hit a record low of 21 percent last year. The …
Analysis of Poison Ivy remote access tool
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …
The mobile cybercrime landscape is becoming more defined
McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …
Why continuous IT cost optimization is essential
After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd