Please turn on your JavaScript for this page to function normally.
laptop
Poor endpoint security can cost you millions in detection, response, and wasted time

A new study reveals organizations are wasting an average of $6 million on the time to detect and contain insecure endpoints, among other staggering findings that show endpoint …

risk
Differences in personal security behaviors of US and UK workers

Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network and data …

idea
IT professionals believe their data is safer in the cloud than on-premise

Nearly seven in 10 executives and over half of IT professionals revealed that they would prefer having a single cloud services provider handling their varied hosted …

Qualys
Assess, report and remediate security-related configuration issues

Qualys announced Security Configuration Assessment (SCA), a new add-on for Vulnerability Management (VM) that provides customers cloud-based tools to automate configuration …

stop
Where does the cyber security buck stop?

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things …

success
Building a strong cybersecurity program for the long haul

Patch Tuesday is approaching and there is a chance it might be a boring one. Hopefully, I didn’t jinx things by saying that, but I think most of what we’ll see is a bit of …

Qualys
Qualys Container Security: Discover, track, and secure containers

Qualys announced a new solution that extends its single-pane visibility and continuous security to the new and growing virtualization environment of Docker containers, and …

Match
Week in review: PowerPoint malware delivery, dark web fraud guides, security through APIs

Here’s an overview of some of last week’s most interesting news and articles: UK ICO offers grants for practical privacy research The programme is open to academic …

doll
Outdated systems and their link to data breaches

BitSight analyzed more than 35,000 companies from industries across the globe over the last year, to better understand the usage of outdated computer operating systems and …

crowd
Cybersecurity workforce gap to hit 1.8 million by 2022

The cybersecurity workforce gap is on pace to hit 1.8 million by 2022 – a 20% increase since 2015. 68% of workers in North America believe this workforce shortage is due to a …

employee
While on vacation, users continue to prioritize convenience over security

Despite the benefits experienced from unplugging, most individuals prefer to stay connected. Fifty-two percent of U.S. respondents indicated that they spend at least an hour a …

mobile payment
Connected devices and the future of payments

More than 80 percent of Americans have a strong interest in using connected devices to make purchases, with a keen eye toward security and data concerns, according to Visa and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools