Employees deliberately ignore security rules
A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …
What do users look for in a security solution?
Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …
Mobile device data recoveries surge
Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …
BYOD and data protection top concerns with cloud adoption
According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …
Piracy and IP theft trouble software publishers
A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …
Chinese military hacker unit cleaning up its tracks
When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …
Enterprise mobility cloud report reveals iOS domination
Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …
The role of critical risks in internal audits
As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …
Patching for industrial cyber security is a broken model
New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …
Microsoft continues to focus on security in their products
86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …
Database security is too complex to implement
A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …
Mandiant threat report on advanced targeted attacks
Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool