Please turn on your JavaScript for this page to function normally.
UK map
9% of all ransomware-infected emails target the UK

9.1% of all ransomware-infected emails detected by Bitdefender in 2015 have targeted UK users. Furthermore, 54% of all malware files targeting the UK contained some form of …

Puzzle
Lack of skills and recruiting among challenges facing information security profession

There is a global shortage of skilled cyber security professionals, according to 68 percent of the 435 senior-level technology professionals who completed a recent Cybrary …

Business
Security testing market to grow to $6.9 billion by 2020

With the ubiquity of web and cloud-based software applications, not only are they essential tools to interconnect enterprises with their customers and prospects, but they are …

Error
HTTP error code 451 will signal online censorship

A new, official HTTP error code has been assigned to denote instances where governments restrict access to specific websites: 451. The number is a reference to Ray …

Juniper Networks
ISC’s infocon turns yellow to reflect critical impact of Juniper backdoors

SANS Institute’s Internet Storm Center has raised its infocon status – the status of the condition of the Internet infrastructure – from green to yellow, …

Java
Oracle agrees to settle FTC charges it deceived consumers about Java updates

Oracle has agreed to settle Federal Trade Commission charges that it deceived consumers about the security provided by updates to its Java Platform, Standard Edition software …

User
Human behaviour still the biggest threat to company security

Nuix, a security intelligence and information management technology company, had in-depth conversations with chief information security officers and directors from Fortune 500 …

clock
Trends that will alter the way IT is consumed in 2016

IndependenceIT made several predictions regarding business computing trends and the consumption of information technology assets. These insights highlight the continued shift …

Coin
Finance teams becoming involved in cyber risk mitigation oversight

CFOs and their finance teams are toughening policies on suppliers and increasing insurance coverage as they are asked take on a larger role in defending their companies from …

Juniper Networks
Who planted the backdoors in Juniper’s firewalls?

Who put the recently discovered “unauthorized code” in ScreenOS, which effectively opened a backdoor in Juniper’s NetScreen firewall devices and allowed …

business
Top trends that will influence your security decisions in 2016

With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

architecture
How BitTorrent activity impacts security ratings

BitSight examined BitTorrent P2P file sharing activity of over 30,700 companies. They looked at the percentage of P2P downloads containing malware, the top torrented …

Don't miss

Cybersecurity news