The importance of ethical hacking
The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …
Most IT admins considered switching careers due to stress
67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the …
Businesses unable to comply with EC 24 hour breach notification
UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …
Most parents secretly access teens’ Facebook accounts
For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …
Mobile phones expose businesses to massive risks
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …
Big data disruptions can be tamed
Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big …
Is online banking like playing Russian Roulette?
Four out of ten consumers suspect they are playing with fire conducting financial transactions online, according to Entersekt. The study of 1,000 people, found that while the …
Poor internal security processes spell disaster
Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …
Mobile devices expose company data to vulnerabilities
Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …
Smart meters vulnerable to false data injection
Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …
It’s official, corporate passwords are cheap
Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …
Sustained drop in spam levels
Industry and government efforts have dealt a significant blow to spam, according to a Commtouch report that is compiled based on an analysis of more than 10 billion …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025