Please turn on your JavaScript for this page to function normally.
79% of professionals do business on personal devices

As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …

Why insider threat is thriving

In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint …

How health care providers can protect sensitive data

Despite increasingly stringent industry regulations a lot of health care organizations along with their business associates often fail to ensure integrity of sensitive …

Can the next EU regulation guarantee data protection for all?

The European Parliament has agreed its text, the Commission is satisfied with the latest draft, so now we’re are only waiting for the Council of member states to work …

Reactions to President Obama’s 2015 State of the Union Address

President Obama’s State of the Union Address featured a new legislative focus on cyber security issues: No foreign nation, no hacker, should be able to shut down our …

Microsoft releases Sysmon 2.0

Sysmon is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows …

11% of Android banking and finance apps are dangerous

RiskIQ found that more than 40,000 of the 350,000 apps which reference banking in the world’s top 90 app stores contain malware or suspicious binaries. Meanwhile, of …

Global shortage of skilled cybersecurity pros

A new global survey of more than 3,400 ISACA members shows that 46 percent of respondents expect their organization to face a cyberattack in 2015 and 83 percent believe …

Bold reform needed to strengthen U.S cybersecurity

Mr. President, the status quo in cybersecurity is failing the U.S. It is failing the commercial sector, which is being publicly breached on a weekly basis, and it is failing …

Cybersecurity readiness: Widening gulf between perception and reality

Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …

SQL injection vulnerabilities surge to highest levels in three years

UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …

Biometric authentication app downloads to reach 770 million by 2019

More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools