
Does hybrid IT offer a competitive advantage?
Hybrid IT is about more than saving money. A survey of IT decision-makers at major financial services, retail, health care, and other organizations found that 50 percent have …

Why you should read the Oculus Terms of Service
Last Monday, the long-awaited Oculus Rift virtual reality headsets started being delivered to their buyers. Hopefully, the latter have read the Terms of Service that come with …

Calculate the cost and probability of a DDoS attack
DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor …

US passport and visa database open to intrusion?
The Consular Consolidated Database (CCD), which contains over 290 million passport-related records, 184 million visa records, and 25 million records on US citizens living …

Global IAM market to reach 24.55 billion by 2022
The global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets. Increased spending by large scale …

Week in review: Hackers breaching law firms, ransomware flare-up, and how to get your talk accepted at Black Hat
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Hackers breaching law firms for insider trading info Two of the most …

PHP, Python still fail to spot revoked TLS certificates
In 2012, a group of researchers demonstrated that SSL certificate validation is broken in many applications and libraries, and pointed out the root causes for that situation: …

Has Reddit been served with a National Security Letter?
Reddit has published its 2015 Transparency Report, and there is one thing missing from it: the entire section about national security requests. The same report for 2014 …

Flaw in HID door controllers lets attackers unlock doors, deactivate alarms
Trend Micro researcher Ricky Lawshae has unearthed a critical vulnerability in HID’s VertX and Edge door controllers. Exploiting the flaw is easy, and could result in …

Why SMBs need threat intelligence
Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for …

SMEs under attack, security readiness still low
When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

Samas ransomware enters hospitals through vulnerable servers
There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool