Do your users understand your cybersecurity policy?
ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity …
IaaS public cloud services market grew 29.5% in 2017
The worldwide infrastructure as a service (IaaS) market grew 29.5 percent in 2017 to total $23.5 billion, up from $18.2 billion in 2016, according to Gartner. Amazon was the …
How the SamSam attacker stole millions from US companies
There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …
Top 10 list of dark web activities that indicate a breach
Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. …
Digital trust: Security pros, business execs and consumers see it differently
An extensive global survey of consumers, cybersecurity professionals and business executives about their views on digital trust conducted by analyst firm Frost & …
Insights into consumer attitudes to biometric payments
Biometric payments are poised for significant growth, but substantial consumer security concerns could put its future at risk according to a new report from Transaction …
Enterprise IT modernization: Replace prerelational DBMS systems
Prerelational database management systems (DBMSs) are aging technology, and the number of applications using these systems is declining. The market share for prerelational …
Analysis: Reported data breaches in Australia
The Office of the Australian Information Commissioner (OAIC) has published the first full quarter report on data breaches that fall under Notifiable Data Breaches scheme and, …
CEO guidance: Handling dynamic change in the cybersecurity industry
In a little over 18 months since SonicWall split from Dell, the company has become operationally and financially independent. “In fact, while achieving independence, we …
Idaho inmates hacked prison system to add money to their accounts
364 inmates at five correctional facilities in Idaho have managed to add nearly a quarter million dollars worth of credit to their JPay accounts by exploiting a vulnerability …
Building a sound security strategy for an energy sector company
As more and more attacks against companies working in the energy sector become public, it is becoming increasingly clear that those systems are far from impermeable. And …
Risks grow, yet security is still an afterthought in many IoT strategies
Trend Micro released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things related cyber attack, however …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity