Please turn on your JavaScript for this page to function normally.
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …

How long is the wait?

Does this question sound familiar? You have probably asked this question several times. Nobody likes to wait. But yet, we wait at restaurants, to see the doctor, and to get …

BalaBit updates Shell Control Box

BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …

Risk IT and services spending to reach $78.6 Billion in 2015

According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …

Workplace stress dramatically impacting IT professionals

High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to …

APTs: The fine balance of control and monitoring

Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …

Top cyber attack vectors for critical SAP systems

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, …

Criminal attacks in healthcare are up 125% since 2010

The healthcare industry is experiencing a surge in data breaches, security incidents, and criminal attacks—exposing millions of patients and their medical records, according …

Cyber attacks aren’t just targeting big business

81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues.The …

72% of companies are not prepared for a data breach

EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …

Crimeware infects one-third of computers worldwide

The APWG reports that during the 4th quarter of 2014, a record number of crimeware variants were detected, a strategy of overwhelming proliferation of variations designed to …

The enduring chasm between security teams and developers

The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools