Innovation drivers for the global web application firewall market
Web applications are vital technologies used by every online company to communicate with employees, partners, customers, and potential customers. The exposed nature of these …
Worldwide digital transformation predictions
While IDC continues to see tremendous momentum and influence of digital transformation (DX) on technology spending worldwide, across all geographies and industries, 59% of …
BEC scammers stealing millions from home buyers
Business Email Compromise (BEC) scams have been on the rise for the last few years, and no industry is safe from these scammers. It has been revealed last week that art …
New Amazon S3 encryption and security features introduced
Amazon Web Services has announced the availability of five new encryption and security features for the Amazon S3 cloud storage service. These include: Default object …
Have you heard about Bitcoin multipliers?
Professedly, they are services that multiply any Bitcoin amount you send them by several times, and return to you the total amount in a mere hours. How do they do that? …
Lack of proper security solutions is annihilating companies’ reputations
Businesses are not meeting consumer expectations around protecting personal information, according to a study conducted by the Ponemon institute across the U.S., U.K., Germany …
How GDPR affects your organization
The countdown is on and global businesses now have just six months until the General Data Protection Regulation (GDPR) is enforced. A recent study from Trend Micro has found …
Top 10 ways to fund the shift to digital business
With many options for digital business transformation requiring significant investment, Gartner has identified the top 10 ways to fund the shift to digital business. According …
Security, privacy issues we need to solve before non-medical implants become pervasive
The cybernetic revolution is happening, and it’s imperative that civil liberties and privacy issues are addressed by system designers, innovators, regulators, and …
Tor Browser flaw leaks users’ real IP address
The Tor Project has issued an emergency security bugfix release of Tor Browser, to prevent user IP address leakage due to a still unpatched Firefox bug. The bug is present …
Infosec expert viewpoint: Vulnerability patching
Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …
The evolution of BYOD security in a mobile-first world
Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits