Please turn on your JavaScript for this page to function normally.
Federal agencies willing, but not ready, for Big Data

More than 75 percent of federal managers believe Big Data has the power to fundamentally transform federal operations, according to the Government Business Council (GBC) and …

European ATM Security Team on fraud losses

European ATM Security Team (EAST) has published its first European Fraud Update for 2013. This is based on country crime updates given by representatives of 21 countries in …

Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Targeted attacks and real world hacks

Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

Chinese military hacker unit cleaning up its tracks

When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

The role of critical risks in internal audits

As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …

Don't miss

Cybersecurity news