Please turn on your JavaScript for this page to function normally.
Whitepaper: CISOs secret weapon for reducing enterprise risk

Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …

Critical factors in preventing data breaches

McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …

One-in-four have been victims of identity theft

Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …

Top 5 fraud risk areas in the workplace

Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely …

TRUSTe deceived consumers through its privacy seal program

TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …

ReadyNAS OS offers 5 levels of data protection

NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …

Most of the top 100 paid Android and iOS apps have been hacked

97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. In addition to an increase in app hacks …

How to become an ISO 27001 / ISO 22301 consultant

If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …

Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Darkhotel espionage campaign targets corporate executives …

Toshiba and Cisco to collaborate on new ways to utilize IoT

Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …

Enabling secure file sharing in the enterprise

As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …

Secure remote file access challenges

While the majority of full-time employees access files remotely (89%), nearly three-quarters (73%) still do so via email, and less than a quarter (22%) are aware of a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools