Enterprise IT supply chains will be compromised
Enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward, according to …
Most believe free Wi-Fi can lead to identity theft
A new study by the Identity Theft Resource Center (ITRC) and PRIVATE WiFi, revealed that 79% of respondents believe that using a free Wi-Fi connection can lead to identity …
Phishing attacks increasingly target brands
The number of brands targeted by phishing attacks sustained an all-time high of 428 in April of this year, the second record-breaking quarter for cybercrime brand abuse …
BYOD security and control fears
Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …
Most people want control of information collected by data brokers
As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …
Network complexity causes security incidents
Complex network security policies, such as those found in multi-vendor environments, are directly related to system outages and security breaches, according to AlgoSec. The …
Merchants ineffectively fighting online fraud
Although most merchants have made a concerted effort to fight e-commerce fraud, their methods are largely ineffective against fraudsters and off-putting to consumers, …
Despite risks, organizations embracing cloud-based email
Many organizations are holding off on migrating email to the cloud in order to first assess the security, compliance and other risks against uncertain cost benefits, according …
SMBs not concerned about cybersecurity
U.S. small business owners or operators have a false sense of cybersecurity as more than three-fourths (77 percent) say their company is safe from cyber threats such as …
Cloud provider assurance: Trust but verify
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance …
Security as an enabler of innovation
For years, many enterprises have viewed IT security as a costly extra that has to be endured as a way to reduce risk, without providing any other value to the business. Recent …
Mounting risks from mobile devices in the enterprise
At RSA Conference Europe 2012, RSA released a new research report from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics