Please turn on your JavaScript for this page to function normally.
Password misuse at root of hacking

48 percent of IT security professionals surveyed have worked for organizations whose network has been breached by a hacker, according to Lieberman Software. The survey paints …

Enterprise IT spending to reach $2.7 trillion in 2012

Worldwide enterprise IT spending is projected to total $2.7 trillion in 2012, a 3.9 percent increase from 2011 spending of $2.6 trillion, according to Gartner. While …

Security pros say that hackers have the upper hand

The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …

40% of SMBs suffered breach due to unsafe Web surfing

40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …

Most social networks users don’t keep up with privacy settings changes

The proliferation and usage of mobile devices is exponentially growing, as is consumers’ dependence on the Web, causing many to lose sight of the importance of keeping …

Top DDoS attacks of 2011

There has been an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected …

Wi-Fi users live in a false sense of security

Wi-Fi users in the U.S. are confident that they are taking the right steps to protect themselves when using Wi-Fi devices. In fact, 97 percent of Wi-Fi users recently surveyed …

Patching strategies

Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …

Serious disconnect between security perceptions and reality

There’s a serious disconnect between security perceptions and reality among IT Enterprise security managers, according to McAfee. The 2011 Data Center Security Survey …

Critical vulnerabilities triple in 2011

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …

Payment card security compliance remains problematic

Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …

10 actions to reduce IT infrastructure and operations costs

As many IT organizations are under intense pressure to continue to implement cost-cutting initiatives, Gartner has identified 10 actions that can reduce IT infrastructure and …

Don't miss

Cybersecurity news