Poor password practices put UK businesses at risk
Britain is a sitting duck for cybercrime because employees couldn’t care less about the security of their workplace systems, according to research by Swivel Secure. …
Reported DDoS attacks up 200 percent
A new Akamai report provides insight into key global statistics including connection speeds, attack traffic, and network connectivity and availability, among many others. …
Phishing attacks skyrocketing
A new phishing survey by the Anti-Phishing Working Group (APWG) reveals that phishers are breaking into hosting providers with unprecedented success, using these facilities to …
35% of businesses experienced a DDoS attack in 2012
When DDoS attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the …
Hosted virtual desktops can increase security
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …
Cyber attacks on trust expose companies to millions in losses
Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …
Secured privileged accounts reduce APT exposure
Organizations can reduce the threat of targeted attacks by proactively securing privileged accounts, according to CyberSheath. The theft, misuse and exploitation of privileged …
The global nature of advanced cyber attacks
FireEye released a report that provides insight into the global nature of malware communication activity related to sophisticated cyber attacks. “The threat landscape …
Is your company ready for a big data breach?
Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …
Analysis of 5 million scans on 53 million hosts
Qualys has analyzed QualysGuard Policy Compliance (PC) data from more than five million scans performed by organizations worldwide to help enterprises understand key trends as …
Remote users expose companies to cybercrime
Results of new remote access security research show half of companies with a remote workforce had their websites compromised in 2012, over a third had passwords hacked, and …
Data thieves and their motives
Large-scale financial cybercrime and state-affiliated espionage dominated the security landscape in 2012, according to a new Verizon report. Taking the top spot for all …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk