Please turn on your JavaScript for this page to function normally.
The ubiquitous social media “buy’ button and the journey of authentication

Earlier this year two of the world’s largest social media sites, Facebook and Twitter, announced the addition of “buy’ buttons to their offerings, giving …

Week in review: Bitstamp hack, dangerous code in free apps, insider threats

Week in review: Bitstamp hack, and global defense-in-depth architectures analyzed Here’s an overview of some of last week’s most interesting news, reviews and …

Security of data in the cloud now an executive-level concern

The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …

Analysis of global defense-in-depth architectures

Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That’s the stark conclusion of …

Innovation must not come at the price of security

One of the main themes to come out of CES has been the advancement of the Connected Human. Whilst we can’t commute to work on a Hoverboard just yet, “Sent From My …

State of the Internet: Attack traffic, DDoS, IPv4 and IPv6

Akamai today released its latest State of the Internet report, which provides insight into key global statistics such as connection speeds and broadband adoption across fixed …

Compromised credentials in enterprise cloud apps

A new Netskope report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given …

The coming shift in security

Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …

Top fraud and corruption trends

Highlighted by a dramatic rise in cyber security risk across all industries, EY Fraud Investigation & Dispute Services (FIDS) unveiled its top fraud and corruption trends …

Top 3 reasons businesses should prioritize web security

2014 was a year of high-profile hacks for businesses around the world. From The Home Depot breach to the recent Sony data leak, it seemed like as soon as one data breach was …

The one compliance lesson you need to learn

We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …

NETGEAR ReadyNAS 200 enables data protection

NETGEAR is expanding its family of NAS devices with the performance-driven ReadyNAS 200 Series for home and home office networks. ReadyNAS 200 transfers files up to an amazing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools