Please turn on your JavaScript for this page to function normally.
Has the time come to give up penetration testing?

By carrying out “white hat’ attacks to identify potential entry points in the externally facing parts of an organization’s IT network, such as its firewalls, …

Guide on actionable information for security incident response

ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security …

The rise of mercenary hacker crews offering Espionage-as-a-Service

Although the Sony attack was loud, damaging and hugely embarrassing to the company, the bigger threat is from mercenary hacker crews who steal billions of dollars of valuable …

The cost of malware containment

Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …

Week in review: Google discloses Windows flaw, French sites under attack, Android users in danger

Here’s an overview of some of last week’s most interesting news and articles: LizardSquad’s DDoS service is powered by hacked home routers The preponderance …

Man arrested for Playstation and Xbox attacks

Officers from the South East Regional Organised Crime Unit (SEROCU) Cyber Crime Unit, supported by Titan ROCU (North West Regional Organised Crime Unit), have arrested a man …

How to prepare if you’re selected for an OCR audit

The forthcoming Office of Civil Rights (OCR) audits for HIPAA compliance have seen some delays this fall – but that doesn’t mean covered organizations can delay …

Hottest Snapchats scam spreads on Facebook

A spam campaign revealing the 10 Hottest Snapchats is a new entry to the long list of Facebook scams flooding the social network. Bitdefender’s Labs have now blacklisted …

WhatsApp sees increasing complexity of spam campaigns

Over the past few months, AdaptiveMobile has tracked an increase of spam complexity on messaging apps, such as WhatsApp, in the United States, Europe and India, and expects …

What is the value of professional certification?

Recognition for and therefore the value of professional certification is rising within the information security domain. In an increasing number of markets across Europe, …

Five key security, identity and access management trends

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …

Unlock your digital world with True Key

Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools