Please turn on your JavaScript for this page to function normally.
architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

hand
82% of executives experienced a fraud incident in the past year

Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …

Head
What resellers think about threats to customers

A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …

smartphone
Organizations to gradually replace physical access cards with smartphones

In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …

RSA Conference Innovation Sandbox
RSA Conference Innovation Sandbox Contest 2017 finalists announced

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

fingerprint
Accurate cross-browser fingerprinting is possible, researchers show

A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …

magnifying glass
Security audit of Dovecot mailserver reveals good security practices

Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …

In 2017, the digital will get physical when machines start to lie

In a memorable scene from a 2014 episode of the series Homeland, the Vice President is murdered by hackers who tamper with his pacemaker. Despite this plot idea reportedly …

keys
Key Transparency: A secure directory of public encryption keys

Google has released Key Transparency, an open source public directory meant to simplify the discovery of intended recipients’ public encryption key. The project is still …

patch
Patch and security management take 8 hours per month for most companies

Shavlik and AppSense used VMworld Europe 2016 to collect data from frontline experts, and to highlight patch management and security concerns in corporations. A total of 178 …

biohazard
Significant decrease in Locky ransomware attacks

Locky ransomware attacks have dramatically decreased during December 2016, according to Check Point. Locky, which uses massive spam campaigns as a major distribution vector, …

Data science tasks
40% of data science tasks will be automated by 2020

More than 40 percent of data science tasks will be automated by 2020, resulting in increased productivity and broader usage of data and analytics by citizen data scientists, …

Don't miss

Cybersecurity news