Please turn on your JavaScript for this page to function normally.
Most companies block cloud services

While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …

The growing headache of protecting mobile devices

33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …

Big brands utilized in malware distribution

Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …

Majority of small businesses not confident in network security

More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …

Major pitfalls involving vulnerability scanners

While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …

Targeted attacks focus on small businesses

36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …

Restoring critical applications a top concern

Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …

Worldwide IT spending to surpass $3.6 trillion in 2012

Worldwide IT spending is on pace to reach $3.6 trillion in 2012, a 3 percent increase from 2011 spending of $3.5 trillion, according to the latest outlook by Gartner. …

8,000+ mobile devices left at top U.S. airports

Credant Technologies announced the results of their survey of top airports in the United States. In the last year, travelers left behind 8,016 mobile devices at seven of the …

Securing apps and avoiding an explosive breach

Recent research from Veracode shows that 84 percent of web applications from American public companies are at risk of being hacked, despite more stringent compliance …

Half of enterprise networks will be obsolete within five years

Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …

ISACA issues COBIT 5 for Information Security

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …

Don't miss

Cybersecurity news