Technology is not the only solution against spear phishing
While technology plays an important role in protecting organizations from cyber threats, spear phishing attacks focus on the human element to ensure success. No technology …
Rapid adoption of hosted email compliance
Financial institutions are rapidly moving to hosted email compliance and storage services to deal with increasing costs, risks and regulations, according to a study conducted …
Malicious use of subdomain services surges
The malicious use of subdomain services by phishers nearly doubled in the second half of 2010, with phishing gangs using these services about as often as they register domain …
90% of organizations have problems with password resets
With increasing numbers of remote and mobile workers, and more and more complex passwords to remember to log onto corporate networks, employees often need to contact IT …
Targeted attacks increase as spam continues to fall
Targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in …
Compliance violations via email increase
In a study of how professionals use, and companies manage, email – particularly the handling of private and confidential information – VaporStream found that …
IT teams still struggling with spam and viruses
IT teams are still struggling to protect their businesses from spam email and viruses, according to Mimecast. Their research also finds that the majority of organizations are …
Most employees would steal confidential company information
The majority of IT staff and C-level executives would definitely take confidential company information when they left their organization, according to Cyber-Ark. Despite 66% …
Dramatic increase in cyberattacks on critical infrastructure
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
Green IT to become a priority
Green IT initiatives will take on added importance in the next few years as more organizations commit financial resources and develop comprehensive strategies, according to a …
Software industry risks and SQL injection trends
With the trend of targeted cyber attacks along with the exploitation of common vulnerabilities such as SQL injection, it is clear that the core software infrastructure of …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics