Please turn on your JavaScript for this page to function normally.
Companies stay vulnerable to web attacks for far too long

While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to …

The rise in false fraud alerts

68% of Americans who have received a fraudulent activity alert from their credit or debit card issuer have received at least one alert in error, according to …

Can you afford to wait 197 days to detect a threat?

Financial services and retail organizations agree, advanced threats are the most serious security challenge facing their organizations, shows a new Ponemon Institute study. …

New UK law says GCHQ agents cannot be prosecuted for hacking

In a job posting published last week, the Government Communications Headquarters (GCHQ) – the UK version of US’ National Security Agency – openly announced …

The cybersecurity domino effect

RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …

The importance of good threat intelligence

The cyber-threats our organizations face are continuing to evolve, partly in respect to the broadening motivations behind attacks, and partly due to the increased …

Secure smart devices for the holiday season

Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …

There’s no security without trust

Trust. It’s a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online …

Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …

ISSA-LA to hold premier Los Angeles information security event

The Seventh Annual Information Security Summit offers educational sessions presented by a world-class line up of keynote and featured presenters.This year’s Summit and …

Combating insider threats in the contact center

Advances in security technology are making many payment channels safer than ever for consumers, however, they are also forcing professional fraudsters to concentrate on an …

Practical applications of machine learning in cyber security

As more and more organizations are being targeted by cyber criminals, questions are being raised about their planning, preparedness, and investment into cyber security in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools