Please turn on your JavaScript for this page to function normally.
Storm
Top 20 risk factors for retailers

According to BDO’s analysis of risk factors listed in the most recent 10-K filings of the 100 largest US retailers, risk associated with a possible security breach was …

Globe
Week in review: Docker security, SWIFT warns of new attacks, SAP vulnerability exploited

Here’s an overview of some of last week’s most interesting news and articles: SWIFT warns of new attacks, Bangladesh Bank heist linked to Sony hack They believe …

Apache Milagro
Milagro: A distributed cryptosystem for the cloud

A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …

password unlock
Do users’ perceptions of password security match reality?

Think your password is secure? You may need to think again. People’s perceptions of password strength may not always match reality, according to a recent study by CyLab, …

hole
Bridging the security automation gap

Security management has gotten out of hand, according to our recent State of Automation in Security Report. 48% of survey respondents had an application outage as a result of …

healthcare
Healthcare under attack! 89% of organizations experienced data breaches

It’s a turbulent time for the healthcare industry: patient data is under siege and hospitals are big targets for cyber attacks, according to the Ponemon Institute. Mistakes …

Worldwide server virtualization market is reaching its peak

The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …

user
Impact of security breaches on consumer trust

High-profile data breaches are negatively impacting consumer trust in major brands, according to a new FireEye report. 76 percent of respondents would likely take their …

tunnel
Financial services IT pros overconfident in breach detection capabilities

A new Tripwire study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber …

World map
Vulnerability management trends in Asia Pacific

A new study conducted by Forrester Consulting evaluated perceived challenges, drivers and benefits of various vulnerability management strategies and investments based on …

industry danger
It’s time to get serious about ICS cybersecurity

As recently reported by The Register, a proof-of-concept PLC worm could spell disaster for the critical infrastructure by making attacks exponentially more difficult to detect …

Microsoft logo
Microsoft releases eight critical updates

Microsoft has released its May patch updates and it was a rather large deployment with 16 total updates this month. The critical versus important updates were split down the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools