Please turn on your JavaScript for this page to function normally.
face
Do employers give enough security training?

More than half of UK office workers say their employers have provided no cyber security awareness training, according to ISACA’s 2016 Cyber Security Perceptions study of more …

CipherCloud
CipherCloud unveils first GDPR-ready cloud security solution

CipherCloud announced the availability of a cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR). Their Cloud …

magnifying glass
Looking for trouble: How predictive analytics is transforming cybersecurity

Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …

bug
Bug bounty report card: Industry diversification and growth

With a global rise in cyberattacks and a critical deficit of security talent to combat adversaries, bug bounty programs congruently grew in both volume and scope in the last …

cloud
Perception of cloud security within enterprises is improving

The perception of cloud security within enterprises is improving dramatically year-over year as cloud applications mature, according to Bitglass. One of the most significant …

Fire
A third of organizations experienced a data breach in the past 12 months

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …

Keyboard
Digital businesses will suffer for inability to manage risk

As organizations transition to digital business, a lack of directly owned infrastructure and services outside of IT’s control will need to be addressed by cybersecurity. …

pyramid
Maslow’s pyramid of cyber deception needs

In 1943, psychologist Abraham Maslow published his theory of human motivation, which turned into a consensual method to analyze a person’s needs. Maslow’s theory …

tools
It takes 248 days for IT businesses to fix their software vulnerabilities

Compiled using data collected from tens of thousands of websites, a new WhiteHat Security report reveals that the majority of web applications exhibit, on average, two or more …

DDoS
Retail, gaming industries hardest hit with web application and DDoS attacks

Akamai published the Q1 2016 State of the Internet – Security Report, which provides a detailed view of the global cloud security threat landscape and in-depth analysis …

programmer
Do companies take customers’ security seriously?

75 percent of adults in the UK would stop doing business with, or would cancel membership to, an organisation if it was hacked. This suggests, however, that a quarter would …

tunnel
Proactive threat hunting: Detect, isolate and eradicate

Organizations worldwide wait until they fall victim to a damaging cyber attack before engaging a provider of managed security services, or MSS, according to Raytheon. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools