Please turn on your JavaScript for this page to function normally.
Inadequate electronic disposal protocols can lead to security leaks

American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …

Using firewall rules to migrate business applications to a private cloud

An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a private cloud has to …

The iCloud keychain and iOS 7 data protection

When Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to …

Popular holiday-themed phishing attacks

The holidays are a busy time for everyone-¦ especially for hackers trying to phish your employees. Phishing is most effective when it exploits human emotions—fear, greed, …

What threats will dominate 2014?

Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and …

The DDoS debate: Multi-layered versus single solution

There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …

Tech giants call for government surveillance reform

Eight Internet giants have formally urged the US president and Congress to reform and limit government surveillance, and have offered several suggestions on how to do it. AOL, …

1Password 4.1 for Mac adds new password updating, better search

Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …

Cybercrime ignorance is a serious risk

Organizations who fail to recognize the threat posed by cyber crime are putting the livelihoods of stakeholders and customers at serious risk, and those organizations that …

13 Anonymous hackers plead guilty to PayPal DDoS attack

Thirteen defendants pleaded guilty in federal court in San Jose on Friday to charges related to their involvement in the cyber-attack of PayPal’s website as part of the …

Cloud security in 2014: Automation and consolidation

Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …

ENISA issues recommendations on SCADA patching

“How long can we afford having critical infrastructures that use unpatched SCADA systems?” the EU’s cyber security Agency ENISA asks, and advises EU Member …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools