UK data breaches up 1000% in five years
Imation today released figures obtained through a request under the Freedom of Information Act which show that data breach numbers in the UK have increased by more than 1000% …
Key challenges in proactive threat management
There is a downward trend in IT’s ability to consistently coordinate, measure and improve security data management processes, including log management, compliance …
Cloud adoption generates security issues
Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security …
Map of state data breach notification laws
Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …
BYOD is not for every company, or every employee
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
Cyber incident reporting in the EU
ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …
Changing risk assessment practices
Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But …
65% of companies expose personally identifiable information
More than 65 percent of businesses don’t protect their customers’ private data from unauthorized employees and consultants, according to a survey of hundreds of IT …
Top mobility challenges facing C-level executives
Mre than fifty percent of the companies surveyed are now planning Mobile Productivity projects to allow employees to access, sync and share documents using mobile devices, …
NSS Labs expose inadequate AV products
NSS Labs testing showed that 9 of 13 popular consumer anti-virus products tested failed to provide adequate protection against exploits targeting two recent critical Microsoft …
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
More than half of employees fail to protect their data
A ComRes poll revealed that while 71% of employees have been able to see or read what someone is working on over their shoulder, 53% do not always take precautions to protect …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics