Please turn on your JavaScript for this page to function normally.
Businessman juggling
Business strategy and innovation framework for the industrial IoT

The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …

lock
The new age of quantum computing

Quantum encryption is the holy grail of truly secure communications. If and when quantum computing becomes a widespread reality, many public-key algorithms will become …

vault
The decline of cyber resilience: Organizations unprepared to face attacks

Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …

Windows
Researchers identify domain-level service credential exploit

CyberArk Labs unveiled new research detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard …

skull
While consumers remain complacent, hackers refine their skills

A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while …

match fire
Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers …

cloud
Insufficient security measures still hinder cloud adoption

Security and privacy of data and systems in the cloud remains a top worry for 70% of IT professionals worldwide, up from 63% in 2015, according to a new Cloud Security Survey …

matrix
Analyzing the latest wave of mega attacks

A new report, using data gathered from the Akamai Intelligent Platform, provides analysis of the current cloud security and threat landscape, including insight into two …

mask
Fake executive social media accounts threaten enterprises

New research has uncovered numerous duplicative Twitter and LinkedIn accounts among Fortune 500 leaders, raising concerns about potential security vulnerabilities. Analysts at …

Wi-Fi
Mobile pros are addicted to Wi-Fi, connectivity impacts their choices

iPass surveyed more than 1,700 mobile professionals worldwide about their connectivity habits and preferences, highlighting the ever-increasing influence of Wi-Fi on our daily …

cloud
Cloud adoption hits all-time high, Microsoft and Google dominate

With continued growth in use of Office 365 and G Suite, overall cloud adoption has hit an all-time high, according to Bitglass. Fifty-nine percent of organizations worldwide …

RSA Conference 2015
Former MI5 director general Dame Stella Rimington to keynote RSA Conference 2017

Dame Stella Rimington will be part of the keynote speaker lineup for RSA Conference 2017 in San Francisco, CA. Dame Stella was formerly Director General of the Security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools