Application vulnerabilities still a top security concern
Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …
Internet scams that dominated in 2012
The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …
Internet Explorer best at blocking malware
NSS Labs released the results and analysis from its web browser security comparative evaluating the protection offered by five browsers – Safari 5, Chrome 25/26, …
How employees use business email
The conventional 9am-5pm working day and five-day working week is a thing of the past for the overwhelming majority of workers at SMBs, according to a new survey on …
Android malware continues to rise
The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs, January through March saw …
Can mobile devices be more secure than PCs?
Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …
Organizations failing to secure primary attack target
Despite repeated warnings, a majority of organizations are failing to enact recommended best practice security policies around one of the primary targets of advanced attacks …
IT executives believe the cloud increases data security
While companies have become increasingly comfortable with the security of third-party cloud service providers, data security – particularly at the end user level – …
Analyzing 450 million lines of software code
A new Coverity report details the analysis of more than 450 million lines of software code through the Coverity Scan service. The service, which began as the largest …
No strategy for data protection?
While financial services organizations are obligated to establish and report stringent service availability objectives for mission-critical systems, they are actually among …
Trojans account for 80% of malware infections
PandaLabs today published its report analyzing the IT security events and incidents from January through March 2013. In the first quarter of 2013 alone, more than six and a …
Serious website vulnerabilities continue to decrease
A new WhiteHat Security report has correlated vulnerability data from tens of thousands of websites from more than 650 organizations, with software development lifecycle …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk