Please turn on your JavaScript for this page to function normally.
Epidemic of unknown malware on enterprise networks

Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …

Key trends in cloud usage, risks and malware

Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …

Are rogue employees the biggest threat to information security?

Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …

Malware peddlers prefer deceptive tactics to exploits

Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …

The prime target for malicious emails

In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …

Calling the cloud: Challenges of managing information

The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications …

Growing dynamic in politically-motivated hacktivism

While financial cybercrime becomes ever more entrenched through a consolidating demand and supply chain, the hacktivist landscape is more turbulent, vacillating constantly in …

Industries on the cyber war front line

ThreatTrack Security published a study that looks at the security vulnerabilities of two industries most often targeted by cybercrime: energy and financial services. 72% of …

Seagate Wireless Plus offers advanced cloud backup

The Seagate Wireless Plus mobile device storage now consists of a family of capacities at 500GB, 1TB and 2TB versions to suit every need along with integration with cloud …

25% of breaches go undetected for more than a day

Recent data breaches have had little impact on the security controls of retail and financial organizations, according to Tripwire. Of the 102 financial organizations and 151 …

Responding to data breaches and increasing security

In this podcast, recorded at Infosecurity Europe 2014, Josie Herbert interviews Craig Carpenter, the Chief Cybersecurity Strategist for AccessData. Carpenter tackles the …

EU Data Protection Regulation: Detection is the best prevention

The UK government recently published guidelines for companies covering the five basic controls that businesses must follow to ensure a minimum level of protection. The goal of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools