Insight on social software and big data analytics
Teradata and Mzinga announced the results of a recent industry survey exploring the use of social technologies and big data analytics in business. The survey’s primary …
BYOD increases costs for most organizations
The results of a study by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed …
6+ million malware samples created in the last 3 months
In the second quarter of 2012 alone, more than six million new malware samples were created, a similar figure to the first quarter, according to PandaLabs. The average number …
BYOD is overtaking the workplace, security is top concern
Across the U.S. and Europe, the majority (78 percent) of enterprise IT decision makers say that employees are already using consumer devices to conduct company business, …
Web apps experience 2,700+ attacks per year
The median annual attack incidents on the 50 Web applications observed was 274 times a year, with one target experiencing more than 2,700 attack incidents. According to a new …
Spam filtering tools fail short with phishing attacks
Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
The underground economy of social networks
In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …
Risky password habit exposed
Over 70% of online users memorize the passwords they use to access secure websites rather than record them on paper or digitally according to a recent survey conducted by …
Insider threat in financial services sector
When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …
Fake products pose real dangers
It’s no surprise that many high-end luxury items, such as handbags and watches, have had its share of knock-offs over the years, mainly because they’re often …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics