Please turn on your JavaScript for this page to function normally.
Mobile security threats cause confusion

UK and US businesses are in a state of uncertainty around if, and how, to protect their networks against the threats brought about by mobile devices entering the workplace. …

Significant malware increase across all platforms

In Q1, PC malware reached its highest levels in four years, as well as a steep increase in malware targeting the Android platform. Mac malware was also on the rise, indicating …

Financial fraud drives most targeted attacks

Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …

BYOD adoption is growing despite security concerns

While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …

What security wants most from Big Data

More than two thirds of IT people think Big Data should be a strategic priority, according to Varonis. More than half expect Big Data to be a strategic initiative over the …

Organizations struggling to enforce policies for managing records

Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …

Password creation policies are the enemy of secure passphrases

Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …

How executives understand and manage IT risks

Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, …

A marathon of holiday spam

The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …

Content-related threats cause significant data loss

Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …

Cloud computing as key to improved data protection

More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …

IT is embracing BYOD

IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …

Don't miss

Cybersecurity news