Please turn on your JavaScript for this page to function normally.
Unlocking the hidden value of information

Unstructured content accounts for 90% of all digital information. This content is locked in a variety of formats, locations, and applications made up of separate repositories, …

Oracle delivers 113 updates

Oracle’s Quarterly Critical Patch Update (CPU) is never a minor event. In April we saw 104 security issues addressed, in January it was 144. This time around we are …

Most dangerous superheroes to search for online

Though he has spent years fighting for good in comic books and on the big screen, Superman has emerged as one of the web’s biggest villains as he comes top in …

100+ DDoS events over 100GB/sec reported this year

Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure. The data shows an unparalleled number of volumetric attacks in the …

How email user habits impact personal life

GFI Software announced the findings of its second independent study into email user habits, which revealed a stark increase in the way that work email is encroaching into the …

65 challenges that cloud computing poses to forensics investigators

The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to …

Breaches exposed 22.8 million personal records of New Yorkers

Attorney General Eric T. Schneiderman issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. The report reveals that …

Active Directory flaw impacts 95% of Fortune 1000 companies

Aorato identified a new threatening flaw within Active Directory that enables attackers to change a victim’s password, despite current security and identity theft …

96% of organizations hit by a security incident in the past year

A new ForeScout report revealed that more than 96 percent of organizations experienced a significant IT security incident in the past year. The majority of IT organizations …

CIOs should make digital business tech an IT responsibility

CIOs need to decide how they will position their IT organization in relation to emerging digital business technologies, such as the Internet of Things, 3D printing, wearable …

NIST releases report on cryptography expertise

NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …

Amazon-hosted malware triples in 6 months

Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools