Please turn on your JavaScript for this page to function normally.
Applying machine learning techniques on contextual data for threat detection

The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you …

Attackers prefer lower-bandwidth DDoS attacks

Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade …

Cybersecurity is being taken seriously around the globe

There has been a dramatic increase in the attention that boards and executives are paying to cybersecurity risk management, according to a new global study developed by the …

Top 5 Android Marshmallow enterprise security benefits

Google’s new Android Marshmallow operating system offers important new security and ease-of-use features that improve its functionality for both enterprise and individual …

Is your board ready for a security incident?

Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …

Prevention is the best cure for identity theft

In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …

The changing role of the risk manager

71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …

Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0

Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …

Exposing fraud behavior patterns associated with compromised identities

Timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities, according to ID:A Labs.Understanding fraud …

With unprotected keys and certificates, businesses lose customers

Unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches, according to The Ponemon Institute …

Employee use of cloud services puts business data at risk

UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate …

Unsurprisingly, companies are not protecting personal information

According to a global survey of privacy and risk professionals, more than half of the 780 respondents say consumers should not feel confident that companies are adequately …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools