Please turn on your JavaScript for this page to function normally.
Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

Chinese military hacker unit cleaning up its tracks

When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

The role of critical risks in internal audits

As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …

Patching for industrial cyber security is a broken model

New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …

Microsoft continues to focus on security in their products

86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …

Database security is too complex to implement

A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …

Mandiant threat report on advanced targeted attacks

Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …

Don't miss

Cybersecurity news