Please turn on your JavaScript for this page to function normally.
access
Access governance holds the security line

We must continue to hold the line, and we are, in this war on information security. We must continue to find our stride and take steps forward in regard to technology …

bomb
Is security enabling or compromising productivity?

While most organizations fundamentally believe connecting people to the best technology is vital to business productivity, many struggle to achieve agility due to traditional …

phone
Banking customers hesitant to use mobile features due to security concerns

Banking customers are hesitant to use mobile features due to fraud and security concerns, according to Kaspersky Lab and IDC Financial Insights. Their findings show that of …

rope
The state of security? No one cares about a breach

In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …

Cloud
Cloud security market in the retail sector expected to grow

The global cloud security market in the retail sector is expected to grow at a CAGR of close to 21% until 2020, according to Technavio. Cloud security is a technology designed …

entrepreneur
Lack of security talent is a threat to corporate safety

Large businesses with a small amount of full-time security experts pay almost three times more to recover from a cyberattack than those businesses with in-house expertise, …

users
Five tips to help execute an employee training program

One of the best ways to reduce the risk of data breaches is employee training. This is particularly important during the fall “back to business” season when many …

world
New wave of targeted attacks focus on industrial organizations

Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …

danger
The inner workings of the Cerber ransomware campaign

Check Point’s research team has analysed the inner workings of Cerber, the world’s biggest ransomware-as-a-service scheme. Cerber execution flow Cerber is a ransomware …

DDoS
Subverting protection into DDoS attacks

On average, DNSSEC reflection can transform an 80-byte query into a 2,313-byte response, an amplification factor of nearly 30 times, which can easily cause a network service …

firefighters
Incident response challenge: How to get out of Firefighter Mode

Organizations tend to have the mindset that their IT and security teams should play the role of First Responders on the scene of a security incident. They expect their IT and …

Defending against crypto ransomware
eBook: Defending against crypto ransomware

Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools