Please turn on your JavaScript for this page to function normally.
entrepreneur
Challenges of cybersecurity due diligence in the acquisition process

Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …

wire
Overreliance on perimeter-based defense creates opportunities for attackers

RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …

Black Hat USA 2016
Three topics everyone will be talking about at Black Hat USA 2016

There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding …

Connect
Cyber synergy: The need for collaborative cyber intelligence

It’s official – cybercrime now has a bigger impact than any other form of crime in the UK. That’s the conclusion drawn by the National Crime Agency (NCA) and Strategic Cyber …

business
Five trends to help senior executives protect against fraud threats

A new Experian report identifies five trends that businesses should assess and take action on to mitigate fraud and improve the customer experience in today’s …

Businessman
Security in the M&A process: Have you done your technical due diligence?

Company acquisitions are common in the cyber security market. Whether you are attempting to bolster your strategic position or looking to acquire the best talent, chances are …

DDoS
DDoS attacks continue to escalate in both size and frequency

Arbor Networks released global DDoS attack data for the first six months of 2016 that shows a continuing escalation in the both the size and frequency of attacks. …

Search
Most CISOs and CIOs need better resources to mitigate threats

Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff …

DARPA Cyber Grand Challenge
First all-machine hacking tournament coming to Las Vegas

Long-lived critical flaws in widely deployed bedrock internet infrastructure are not rare. Analysts have estimated that, on average, such flaws go unremediated for 10 months …

Rio 2016 tickets
Rio 2016: The world is watching, especially hackers

When each nation’s best athletes compete at the Olympic Games, one city seemingly becomes the center of the universe. And while we look on closely—captivated by the …

download
Demand for cloud data encryption creates CASB market growth

The global cloud access security brokers market will expand at a CAGR of 16.7% during the period between 2016 and 2024, according to a new report by Transparency Market …

abstract
Week in review: Anti-ransomware, Pokémon GO dangers, and a new anonymity system

Here’s an overview of some of last week’s most interesting news and articles: Researchers create effective anti-ransomware solution Are you willing to sacrifice a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools