Please turn on your JavaScript for this page to function normally.
phishing
Cybercrime gangs continue to go where the money is

According to the APWG’s new Phishing Activity Trends Report, phishing in the first part of 2018 surged 46 percent higher than late 2017. The total number of phish detected in …

businessman
Employees who witness compliance violations twice as likely to leave company

Twenty-nine percent of employees observed at least one compliance violation at work in 2016 or 2017, according to a survey by Gartner. The survey, which sampled more than …

email
Rise in email impersonation attacks makes companies re-assess their security efforts

Most companies believe they’ve experienced serious data breaches driven by email impersonation in the past 12 months – but are not doing nearly enough to prevent future …

industry
Industrial cybersecurity: Protecting OT from IT

A powerful technique for protecting OT from IT, or to enforce whatever separation is required to ensure the integrity of industrial control infrastructure, involves …

automate
Securely deploying automation for business benefit

Streamlining business processes – and cutting down on the need for human employees to perform mundane and repetitive tasks – automation technology is increasingly being …

insider threat
Do your users understand your cybersecurity policy?

ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity …

server
IaaS public cloud services market grew 29.5% in 2017

The worldwide infrastructure as a service (IaaS) market grew 29.5 percent in 2017 to total $23.5 billion, up from $18.2 billion in 2016, according to Gartner. Amazon was the …

JD-HITBSecConf2018: Technical trainings, talks, exhibitions, competitions

HITB, organizer of the popular HITB Security Conference series, is collaborating with JD.com to bring its popular JD – HITB Security Conference to China for the first …

dark
Top 10 list of dark web activities that indicate a breach

Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. …

Black Hat
Three security trends to watch for at Black Hat USA 2018

Thus far in 2018, organizations and individuals worldwide have experienced a large number of high profile cyber attacks, with criminals stealing billions of dollars as well as …

lock
Digital trust: Security pros, business execs and consumers see it differently

An extensive global survey of consumers, cybersecurity professionals and business executives about their views on digital trust conducted by analyst firm Frost & …

face
Insights into consumer attitudes to biometric payments

Biometric payments are poised for significant growth, but substantial consumer security concerns could put its future at risk according to a new report from Transaction …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools