
Beyond GDPR: Data protection as a competitive advantage
A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data …

The privacy implications of email tracking
Emails are a widely used means for third parties to tie your email address to your activities across the web, Princeton University researchers have discovered. The extent of …

Most network endpoints are in the dark: Do you know how to find them?
Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …

Outsmarting grid security threats
Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric …

IT concerned about losing jobs while industry worried about IT talent shortage
While the cybersecurity industry is desperately trying to manage a worldwide shortage of qualified cybersecurity professionals, 56 percent of these professionals fear they’ll …

Google to enforce HTTPS on TLDs it controls
In its sustained quest to bring encryption to all existing Web sites, Google has announced that it will start enforcing HTTPS for the 45 Top-Level Domains it operates. How …

Top blacklisted Android and iOS apps by enterprises
Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data …

The 2013 Yahoo breach affected all 3 billion of its users
Yahoo, now part of the newly created Verizon subsidiary Oath, has announced that the 2013 breach it disclosed in December 2016 affected more users than previously believed. …

When it comes to data breaches, consumers don’t know where to turn
The results of a new Identity Theft Resource Center (ITRC) study on consumer perceptions and behaviors in response to identity theft and data breaches demonstrate widespread …

How boardrooms are safeguarding digital assets
More than 90 percent of surveyed senior business leaders agree that strong technology governance contributes to improved business outcomes and increased agility, according to …

The changing role of the Chief Information Officer
Digitalization and technological innovation are changing the nature of the job of the CIO. Leaders are rapidly scaling their digital businesses, making the remainder of this …

PKI changes and uncertainty due to new applications
New research by the Ponemon Institute reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)