Please turn on your JavaScript for this page to function normally.
crowd
Making security everybody’s business goes beyond strong passwords

One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

email
Majority of workers blindly open email attachments

The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

GDPR
GDPR requirements: Five high-priority actions

The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on May 25, 2018. Gartner predicts that by the end of 2018, more than …

target
Brands increasingly targeted by false websites and phishing

DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …

City
Malware Hunter: Find C&C servers for botnets

Recorded Future and Shodan released Malware Hunter, a specialized crawler for security researchers that explores the Internet to find computers acting as remote access trojan …

lips
Battling cyber security’s human condition

There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …

Red Hat containers
Container Health Index: Red Hat’s standard for trusted containers

Red Hat introduced the Container Health Index, which provides a comprehensive image detail of any enterprise container service. The index grades all of Red Hat’s containerized …

DDoS
DDoS attacks: $100,000 per hour is at risk during peak revenue generation periods

Neustar and Harris Interactive conducted global, independent research of 1,010 directors, managers, CISOs, CSOs, CTOs, and other c-suite executives to find out how DDoS …

mobile device
Data security and mobile devices: How to make it work

There has been a lot of hype in the media about messaging tools. But recently, some of the headlines have taken a negative turn. Just last month, we read how a London-based …

world
200 million financial services records breached in 2016, 900% increase from 2015

The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …

Windows 10
Windows 10 adoption is accelerating, many concerns remain

The vast majority of IT organizations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption, according to a new …

general virtual digital
Week in review: Lure10 attack, DoublePulsar exploit proliferation

Here’s an overview of some of last week’s most interesting news and articles: BrickerBot bricked 2 million IoT devices, its author claims The author of BrickerBot, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools