Please turn on your JavaScript for this page to function normally.
Cloud encryption and tokenization trends in financial services

The adoption of the cloud continues to grow rapidly with Gartner forecasting $282 billion in spending by 2018.“As financial services adopt the cloud, strict compliance …

Organizations on the hunt for DevOps, IoT and mobile skills

Red Hat released findings from its recent mobile survey revealing trends in enterprise mobility hiring priorities for 2015. According to the survey, 50 percent of …

Commercial code is more compliant to security standards than open source code

A new report details the analysis of nearly 10 billion lines of source code through the Coverity Scan service and usage of the Synopsys Coverity Software Testing Platform.For …

More than a third of employees would sell company data

A Loudhouse survey on enterprise security practices reveals that 35 percent of employees would sell information on company patents, financial records and customer credit card …

Distrust in use of personal data could hinder business growth

A study from the Digital Catapult has explored trust in the use of personal data and revealed worrying trends which could hinder the delivery of digital services and business …

Most malvertising attacks are hosted on news and entertainment websites

“More than 50 percent of malvertising is unknowingly hosted on news and entertainment websites, according to Bromium. “Bad actors look to extend their reach as far …

Sun Tzu 2.0: Is cyberwar the new warfare?

For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks …

Can organizations hold back the tide of cloud adoption?

For many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming, according to a new report by analyst firm …

How complex attacks drive the IT security innovation race

There’s a need for organizations to reduce time to detection (TTD) in order to remediate against sophisticated attacks by highly motivated threat actors, according to …

New Google Drive phishing campaign exposed

Elastica discovered a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised websites …

Automated threat management: No signature required

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …

Internet of Things: Bracing for the data flood

There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools