Online file sharing poses great security risks
As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …
Big Data skilled professionals in demand
The shortage of Big Data skilled professionals is driving the need for collaborative self-service access to Hadoop across companies of all sizes, according to Karmasphere. …
BYOD workers pose serious security risks
Fortinet conducted a global survey that reveals the extent of the challenge posed to corporate IT systems by first generation Bring Your Own Device (BYOD) users; people …
UK businesses worst in Europe at protecting information
Mid-sized businesses in the UK are Europe’s worst performers when it comes to managing information risk, according to research from Iron Mountain and PwC. The study …
Increase in cyber threats and sabotage on critical infrastructure
The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …
Real life examples on hackers bypassing CAPTCHA
Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …
SAP security vulnerabilities, metrics and threats
A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …
IT leaders want greater insight
Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …
BYOD influences enterprise mobile security
The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile …
CEOs lack visibility into seriousness of security threats
CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …
Insider threat as prime security concern
Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …
Growing security demands, old security infrastructure
SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …