Please turn on your JavaScript for this page to function normally.
emergency
IT pros spend too much time handling emergencies

A 1E survey of 1,014 IT professionals, who together manage more than 21 million endpoints globally, centered on unplanned activities – how often they occur, what types are …

cyber
Like it or not, “cyber” is a shorthand for all things infosec

We have lost the cyber war. No, not that cyber war. Maybe war of words is a better way to put it. Whether we like it or not, cyber has become the default way for everyone else …

hard drive
Used devices are a treasure trove of personally identifiable information

40 percent of hard drives, mobile phones and tablets resold in publicly-available resale channels contain personally identifiable information (PII), according to an analysis …

puzzle
A new approach is needed in the battle against cyber attacks

How do you search for something that’s invisible? An increase in the sophistication of cyber attacks means that it takes an average of 146 days before a corporate hack is …

abstract
Week in review: Leaking LastPass extensions, 300+ hackable Cisco switches

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Malware posing as Siemens PLC software is hitting industrial environments …

Money
GoDaddy acquires Sucuri

GoDaddy has entered into an agreement to purchase Sucuri, a provider of website security products and services. Financial details of the transaction were not disclosed. Sucuri …

smartphone
Lack of security patching leaves mobile users exposed

An analysis of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than …

healthcare
Healthcare IT pros believe data is safer in the cloud

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer …

PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

architecture
3 sour notes interrupting security operations harmony

Great musicians and instruments alone do not make beautiful music. It is the conductor who leads the orchestra and turns the collection of sounds into perfectly executed …

arrows
Will most security operations transition to the cloud?

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud …

Police
Lithuanian arrested for $100 million BEC scams

Criminal charges were announced against Evaldas Rimasauskas for orchestrating a fraudulent business email compromise (BEC) scheme that induced two U.S.-based Internet …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools