Please turn on your JavaScript for this page to function normally.
sign
Good practice guide on disclosing vulnerabilities

ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …

user
Endpoint security really can improve user experience

Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …

Internet
Unexpected implications arising from the Internet of Things

More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks

Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …

Library
Success of the Internet of Things depends on privacy and security

Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …

password
Compromised credentials a leading concern for most security pros

90% of organizations are worried about compromised credentials, though 60% say they cannot catch these types of attacks today, according to a new survey by Rapid7. 62% of …

business
Key principles for corporate digital responsibility

Businesses’ use of personal data from consumers is at risk and recommends key strategies and principles to properly protect consumer data, build trust and simultaneously grow …

justice sentence gavel law court
Why the legal sector is risking confidential information

The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …

Storm
800 risk experts from 40 countries identify the top global business risks

The risk landscape for businesses is substantially changing in 2016. While businesses are less concerned about the impact of traditional industrial risks such as natural …

Cloud
Shift in strategy around cloud adoption and security

Cloud adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place, according to a new CSA survey. …

sign
Compliance compounded by evolving threat landscape

As industry business models change, compliance challenges are being compounded by an evolving threat landscape and by increased scrutiny from federal agencies looking to …

market
Cloud Identity and Access Management market to reach $2.8 billion by 2020

A new report by Allied Market Research projects that the global cloud IAM market would garner revenue of $2.8 billion by 2020, registering a CAGR of 26.2% during the forecast …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools