
Consumers are ready to say goodbye to passwords
A new survey of 1,000 Americans exploring awareness and perceptions of biometric authentication confirms that consumers continue to have a strong interest in new biometric …

Examining attitudes towards confidential data
Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of …

CLTRe join the race to be crowned as a Tech Trailblazer
CLTRe have been selected as a finalist in the Firestarter Trailblazer category in the Tech Trailblazers Awards. The shortlists have been selected by a panel of leading IT …

(IN)SECURE Magazine issue 56 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 56 has been released today. Table of contents How …

Complex regulations and sophisticated cyberattacks inflate non-compliance costs
The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with …

Script-based attacks and overall malware on the rise
Research revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that …

Reliability, security and QoS are critical when evaluating networking solutions providers
Reliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have …

By 2020, artificial intelligence will create more jobs than it eliminates
2020 will be a pivotal year in AI-related employment dynamics, according to Gartner, as artificial intelligence (AI) will become a positive job motivator. The number of jobs …

Taking the physician’s pulse on cybersecurity
More than four in five U.S. physicians (83 percent) have experienced some form of a cybersecurity attack, according to Accenture and the American Medical Association (AMA). …

IoT data exchange: Building trust and value
The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or …

Flaw in Office 365 with Azure AD Connect could result in domain compromise
The Preempt research team has uncovered a vulnerability with Microsoft Office 365 when integrated with an on-premises Active Directory Domain Services (AD DS) using Azure AD …

Emerging trends companies should prepare for in 2018
Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility