
Dark web mapping reveals that half of the content is legal
A recent global survey commissioned by the Centre for International Governance Innovation (CIGI) showed that seven in ten (71%) global citizens say the “dark net” – …

BEC scammers stole $2.3 billion in less than three years
Once again, the FBI has issued a warning about business email compromise scams. Their numbers say there has been a 270 percent increase in identified victims and exposed loss …

Surge in cyber attacks on the energy sector
A new survey conducted by Dimensional Research, which was carried out in November 2015, assessed cyber security challenges faced by organizations in the energy sector. Study …

Consumer concerns of a connected world
While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …

Lack of backup tech hinders next-generation database adoption
While there is immediate and increasing interest in evolving infrastructure to support distributed, scale-out databases and cloud databases, a lack of robust backup and …

Worldwide IT spending to decline this year
Worldwide IT spending is forecast to total $3.49 trillion in 2016, a decline of 0.5 percent over 2015 spending of $3.5 trillion, according to Gartner. This is down from last …

New application level attack bodes ill for hybrid DDoS protection
Imperva has recently witnessed a new type of DDoS attack they believe might become a go-to for cyber criminals looking to take sites and services down. The attack was an …

Healthcare industry has an alarming mobile security gap
The healthcare industry is massively adopting smart mobile devices, but still moves very slowly when it comes to implementing cyber security measures to protect those devices. …

Panama Papers breach was the result of lax security practices?
News items based on the so-called “Panama Papers,” a set of 11.5 million documents leaked from the networks of Panama-based law firm Mossack Fonseca, keep popping …

Who owns corporate data? Employees think they can just take it
A third of all employees believe they own – or share ownership of – the corporate data they work on, with half thinking they can take the data with them when they …

Centrally manage all of your intelligence data with ThreatQ
In this podcast recorded at RSA Conference 2016, Chris Jacob, Global Director of Threat Intelligence Engineers at ThreatQuotient, introduces the ThreatQ threat intelligence …

Developing a mobile health app? Check which federal laws apply
The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool