Investors demand more transparency about corporate cyberattacks
More than 70 percent of American investors are interested in reviewing public company cybersecurity practices and nearly 80 percent would not likely consider investing in a …
Big Data capabilities crucial for effective cyber defense, says study
A study from a top cybersecurity analyst firm confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, …
Shortage of infosec pros equals frequent and costly data breaches
(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
IBM shows where vulnerabilities appear in iOS apps
IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …
25% of DDoS attacks in 2013 will be application-based
Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
$400 million risk lurking inside global enterprises
Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …
12.6 million identity fraud victims identified in the U.S.
In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
Chinese Army unit is behind cyber espionage campaigns, researchers claim
Mandiant, the computer forensic and incident response firm that got called in following the recent breaches of the New York Times‘ and Wall Street Journal‘s …
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool