Please turn on your JavaScript for this page to function normally.
BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

Chinese military hacker unit cleaning up its tracks

When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

The role of critical risks in internal audits

As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …

Patching for industrial cyber security is a broken model

New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …

Microsoft continues to focus on security in their products

86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …

Database security is too complex to implement

A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …

Mandiant threat report on advanced targeted attacks

Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …

CSOs must adopt new risk management trends

Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …

Who are the enemies of the Internet?

In their latest report on online surveillance, Reporters Without Borders have named Bahrain, China, Iran, Syria and Vietnam as “state enemies” of the Internet due …

2013 will be the year of larger scale big data adoption

After a few years of experimentation and early adopter successes, 2013 will be the year of larger scale adoption of big data technologies, according to Gartner, Inc. According …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools