Please turn on your JavaScript for this page to function normally.
RSA Conference 2015
Don’t miss these keynotes at RSAC 2019

RSA Conference keynotes look a little different this year. We’ve dedicated two stages to keynotes this year instead of the usual one, and we’ve got more presenters speaking to …

Fear
Week in review: Formjacking, flawed password managers, phishers’ new trick

Here’s an overview of some of last week’s most interesting news and articles: IT security incidents affecting German critical infrastructure are on the rise In …

money
Criminal groups promising salaries averaging $360,000 per year to accomplices

New research from Digital Shadows reveals that criminal groups are promising salaries averaging the equivalent of $360,000 per year to accomplices who can help them target …

cloud
Exposure of sensitive data via cloud applications and services increases 20%

To identify top threats, the Dtex researchers collected and analyzed information from work-issued endpoints across more than 300,000 user accounts. Proprietary, cloud and …

face
92% of organizations rank users as their primary security concern

Cybercrime continues to evolve and become more sophisticated. AI and machine learning are leveraged by many criminal organizations to help them better understand how to …

person
Tech companies fret over data privacy, but ready to bet on IPO market

Cybersecurity concerns, along with U.S. economic growth, are the two top drivers anticipated to spur overall U.S. tech industry growth in 2019. Data privacy remains at the …

collaboration
The risks associated with the influx of unauthorized collaboration tools

A majority (82 percent) of end-users are pushing back on IT or management when the company tries to dictate which collaboration tools should be used. But IT is standing its …

(IN)SECURE Magazine issue 61
(IN)SECURE Magazine issue 61 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 61 has been released today. Table of contents How …

analyze
CISO’s guide to an effective post-incident board report

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the …

Symantec ISTR
Formjacking is the new get rich quick scheme for cybercriminals

Faced with diminishing returns from ransomware and cryptojacking, cybercriminals are doubling down on alternative methods, such as formjacking, to make money according to …

shadow
Prevent shadow IT: Companies need security covering multiple communication vectors

There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …

touchscreen
Global mobile networks to support 12.3 billion devices and IoT connections by 2022

There has been a worldwide rise in mobile access for consumers and business users. The expanded reach and quality of mobile broadband has fostered a seemingly insatiable …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools