Please turn on your JavaScript for this page to function normally.
CSA book
100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security …

BYOD
How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …

arrow
Week in review: iOS zero-days exploited, hacking cellphone towers and brain implants

Here’s an overview of some of last week’s most interesting news, reviews and articles: Backdoor uses TeamViewer to spy on victims A backdoor Trojan with spying …

Users lock
The current state of privileged access management practices

There’s a widening gulf between organizations that adhere to best practices for privileged access management, according to BeyondTrust. Password and credential …

Pokémon GO
Essential Pokémon GO protection tips

Since its release, Pokémon GO has become the most downloaded game in history on iOS and Android. However, Gemalto is now warning its millions of players around the world to …

stats
Global mobile deep packet inspection market explodes

The global mobile deep packet inspection (DPI) market will grow at an impressive CAGR of almost 22% until 2020, according to Technavio. Stateful packet inspection Stateful …

Armor
Armor helps streamline HITRUST certification

As the healthcare industry continues to be a major cybercrime target, compliance has gained even more significance. HITRUST certification has emerged as the benchmark for …

biohazard
The evolution of BEC scams and ransomware

Trend Micro analyzed the trends in attacks and vulnerabilities seen throughout the first half of this year, and found a rise and impact of attacks, such as a 172 percent …

KPMG security
Consumers ready to walk away from their favorite retailers if a breach occurs

Consumers are wary of the increased frequency of cyber attacks against retailers, and many are ready to walk away from their favorite retailers if a breach occurs. In fact, in …

Europe
Cyber attacks: Hindsight is 20/20, GDPR is even better

The dust is beginning to settle on the EU referendum result. But, while the UK’s departure from the union is set to shake things up for many businesses nationwide, there’s at …

chip
Researchers design a chip that checks for sabotage

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

antenna
Cybercriminals select insiders to attack telecom providers

Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools