Please turn on your JavaScript for this page to function normally.
success
Five tips to avoid getting hit by ransomware

Ransomware has emerged as the predominant online security threat to home users and small businesses. Delivered through spam or phishing emails that trick users into clicking …

SAP
SANS maps SAP cybersecurity to the CIS Critical Security Controls list

The CIS Critical Security Controls are a set of internationally recognized standards outlining the most important cyber hygiene actions that every organization should …

market
Growing advanced threats will augment the IT security market through 2020

Research analysts are forecasting positive growth for many segments of the global IT security market over the next four years as several markets including BYOD security, …

general virtual digital
Week in review: API security, keyloggers disguised as USB device chargers, online tracking

Here’s an overview of some of last week’s most interesting news and articles: Faulty TLS implementation opens VISA sites, users to attack A group of researchers …

money
IT security skills remain in high demand

IT security tops the list of the skills that IT decision-makers say they want their team members to have, according to a new report by Global Knowledge, based on input from …

CEO
1 in 10 banking CEOs don’t know if they’ve been hacked

Twelve percent of banking CEOs say they do not have insight into whether their institution’s security has been compromised by a cyber attack in the past two years, …

abstract
Making security a high priority may not lead to improved measures

Technology professionals see many steps that could be taken to improve their company’s security. Just over half of the 500 security professionals surveyed by CompTIA say …

Big Data
Big Data and business analytics revenues to reach $187 billion in 2019

Worldwide revenues for Big Data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase of more than 50% over the …

cables
IoT security testing and certification program

To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program …

lock
Strengthen security during production and development

Applications have become the heart of many businesses, with millions of dollars allocated to their development and millions of dollars in revenue associated with their …

phishing
Phishing attacks rise to highest level since 2004

The Anti-Phishing Working Group (APWG) observed more phishing attacks in the first quarter of 2016 than at any other time in history. According to a new report, the total …

vault
Security delays digital adoption in banks, billions at stake

$405.3 billion, that’s the Digital Value at Stake (VaS) retail banks have the potential to realize from 2015 to 2017. Yet, in 2015, financial services as a whole captured just …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools