Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
IT security pros have trouble communicating with executives
A Hanover Research survey of 131 information security professionals revealed key differences between the way executive and non-executive IT professionals communicate with …
A spotlight on grid insecurity
Drawing from responses from more than 100 utilities across America, a new report shows that the nation’s electric grid remains highly vulnerable to attacks from Iran and …
Experts highlight top data breach vulnerabilities
Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …
Why BYOx is the next big concern of CISOs
Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …
IT pros focus on cloud security, not hype
Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …
Digital Government Strategy progress and challenges
A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …
Over 45% of IT pros snitch on their colleagues
Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …
Application vulnerabilities still a top security concern
Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …
Internet scams that dominated in 2012
The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …
Internet Explorer best at blocking malware
NSS Labs released the results and analysis from its web browser security comparative evaluating the protection offered by five browsers – Safari 5, Chrome 25/26, …
How employees use business email
The conventional 9am-5pm working day and five-day working week is a thing of the past for the overwhelming majority of workers at SMBs, according to a new survey on …
Featured news
Resources
Don't miss
- Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
- China-linked Salt Typhoon hackers attempt to infiltrate European telco
- Most AI privacy research looks the wrong way
- Why ex-military professionals are a good fit for cybersecurity
- Nodepass: Open-source TCP/UDP tunneling solution