Please turn on your JavaScript for this page to function normally.
lights
Developing the perfect exfiltration technique

At SafeBreach, one of our major research areas is exfiltration (sending sensitive data out of the corporate network). In one of our research projects in late 2015, we set out …

skull binary
The inconvenient truth about API security

Ovum Consulting asked IT and security professionals across a variety of industries globally about their use of APIs, adoption of API management platforms, and the security …

Bomgar survey
Are your vendors leaving you vulnerable?

Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the …

general virtual digital
Week in review: Panama Papers, dark web mapping, WhatsApp end-to-end encryption

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Panama Papers breach was the result of lax security practices? News items …

energy
Surge in cyber attacks on the energy sector

A new survey conducted by Dimensional Research, which was carried out in November 2015, assessed cyber security challenges faced by organizations in the energy sector. Study …

IoT
Consumer concerns of a connected world

While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …

numbers
Lack of backup tech hinders next-generation database adoption

While there is immediate and increasing interest in evolving infrastructure to support distributed, scale-out databases and cloud databases, a lack of robust backup and …

money
Worldwide IT spending to decline this year

Worldwide IT spending is forecast to total $3.49 trillion in 2016, a decline of 0.5 percent over 2015 spending of $3.5 trillion, according to Gartner. This is down from last …

Magnify
Who owns corporate data? Employees think they can just take it

A third of all employees believe they own – or share ownership of – the corporate data they work on, with half thinking they can take the data with them when they …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

explode
eBook: Guide to protecting SaaS apps from DDoS attacks

With a business model dependent on 100% uptime for their online customers, the last thing SaaS companies can afford is a DDoS attack. Read this DDoS eBook from Incapsula and …

IoT
The security impact of IoT evolution

Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools