Please turn on your JavaScript for this page to function normally.
vault
Four ways to keep data safe during election season

There is no shortage of passionate feelings among voters when it comes to this November’s presidential election. Those feelings extend tenfold to each candidate’s campaigns. …

skull binary
Fight fraud: Scams, identity theft, ransomware attacks

In an increasingly technology-oriented world, cybercrime has become all too common for both consumers and businesses. Internet crime takes many forms and includes everything …

Business ideas
Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the …

money
How much law firms dedicate to data privacy and security

Vulnerabilities in law firms’ data security present an unprecedented existential threat, while increasing corporate demand for legal expertise in information security, …

Europol
13 countries join global ransomware fight

Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …

IoT
Democracy for the Internet of Things

In the past I’ve written a number of times on the way that the IoT potentially changes the relationship between governments and their constituents – and a profound change that …

ENISA Cyber Europe
Cyber Europe 2016: Analyzing realistic cybersecurity incidents

The European ICT Industry is one of the most advanced in the world. Making the EU’s single market fit for the digital age could contribute €415 billion per year to the …

hourglass
Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking

Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …

skull
How to implement an EFSS ransomware recovery plan

Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …

cloud
Alarming cloud encryption misconceptions revealed

Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

building
Worldwide security technology revenue to surpass $100 billion in 2020

Worldwide revenues for security-related hardware, software, and services will grow from $73.7 billion in 2016 to $101.6 billion in 2020. This represents a compound annual …

traffic
1 in 5 executives take risks with sensitive data to meet regulatory demands

The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools