Please turn on your JavaScript for this page to function normally.
stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

employee
While on vacation, users continue to prioritize convenience over security

Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …

camera
Foscam IP cameras riddled with gaping security holes

F-Secure researchers have discovered a bucketload of serious security vulnerabilities affecting IP cameras made by Chinese manufacturer Foscam. Even though notified months …

vacation mobile wi-fi wireless secure
How to stay secure while staying connected on vacation

The wide availability of Wi-Fi networks can make it difficult to unplug and disconnect on vacation, but if consumers take that extra step and unplug they can experience a more …

idea
It’s time for a common sense security framework

Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board …

communication
What’s really stopping users from adopting secure communication tools?

“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …

struggle
Rising volume of attacks overpowers security teams

New research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security …

city
What will it take to keep smart cities safe?

“Smart cities” use smart technologies in their critical infrastructure sectors: energy, transportation, environment, communications, and government. This includes …

idea
5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …

Car
Guidance for connected vehicle security: Attack vectors and impacts

The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) …

construction
How to build a better SOC team

The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost …

ENISA Cyber Europe
Cybersecurity: Industry concerns and suggestions for policy makers

The EU Agency for Network and Information security – ENISA – together with industry recently reached a common position on cybersecurity, that reflects the concerns of industry …

Don't miss

Cybersecurity news