Please turn on your JavaScript for this page to function normally.
money
How tax fraud occurs and how to stay safe

The IRS is now taking up to 21 days to review a tax return. Last year, a similar tax return took seven days to review, according to iovation. This increase of taking up to …

Former US Embassy employee imprisoned for sextortion

Former US State Department employee Michael C. Ford has been sentenced to four years, and nine months in prison for perpetrating a widespread, international e-mail phishing, …

Business ideas
Enhance your security ecosystem with TITUS Illuminate

The amount of data being created, shared and stored is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, …

cables
Network security operations becoming more difficult

One hundred and fifty enterprise IT security professionals from a wide range of industries were surveyed by Enterprise Strategy Group (ESG) to gain a better understanding of …

5 key questions to determine your security posture

To understand any businesses’ security posture, one must first understand the eight categories of cybersecurity that is impacted: security intelligence, fraud, people, …

center
Data centric security key to cloud and digital business

Recent breaches demonstrate the urgent need to secure enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. …

password
Growing security negligence in the workplace

A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …

Amazon
Amazon selfie password: Is this the future?

Amazon’s “Selfie Authentication” allows the site’s customers to user facial recognition to authenticate themselves to the website in order to make a purchase. While not …

Keyboard
Lynis 2.2.0: New features, tests, and enhancements

Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

light
Demand for advanced DDoS mitigation on the rise

The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …

world in hand
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in

Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in Here’s an overview of some of last …

building
Privacy by Design: What it is and where to build it

People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools