Global view into application usage
New research published by Palo Alto Networks indicates explosive growth in global social networking and browser-based file sharing on corporate networks, with a 300 percent …
Threat incidents and security wins in 2011
Having spent much of the year battling data breaches that led to huge information and financial loss, the security industry was likely relieved to see 2011 come to a close. In …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Retailers increasingly considering biometric authentication
More than half of retailers still use passwords for point-of-sale (POS) system login, despite concerns over the sharing and misuse of those passwords, according to …
Key security developments for 2012
Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology …
Worldwide IT spending to grow in 2012
Worldwide IT spending is forecast to total $3.8 trillion in 2012, a 3.7 percent increase from 2011, according to the latest outlook by Gartner. In 2011, worldwide IT spending …
Online scam susceptibility of American consumers
PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
Emerging threats to become major players in 2012
Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
Challenges facing critical infrastructure operators
While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of …
Security behavior and buying trends for 2012
PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics