Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Real-world software security initiatives study
Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …
One third of European organizations refuse to implement BYOD
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
Data migrations: Potential security hole
While 95% of organisations move data at least once per year, 65% of those surveyed admitted that they were not confident sensitive data was protected during a migrationm, …
Cloud services market to surpass $109 billion in 2012
The public cloud services market is forecast to grow 19.6 percent in 2012 to total $109 billion worldwide, according to Gartner. Business process services (also known as …
Majority of companies suffered a web application security breach
Web application security incidents have become increasingly common and expensive, with the majority of companies experiencing at least one breach in the last 18 months and …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Worldwide security infrastructure market will grow 8.4%
While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics