Mirko Zorz
CFOs are not confident about their level of security
CFOs’ long-term outlook for the North American economy remains strong despite their weakening confidence in their own companies’ prospects, according to Deloitte. Lower …
The soaring cost of malware containment
“Organizations are dealing with nearly 10,000 malware alerts per week, however, only 22% of these are considered reliable, according to a new report from The Ponemon …
Threat intelligence: Sources, sharing, utilization and the government
More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to …
Data-centric security with RightsWATCH
The fact that sensitive data seems to increasingly follow a pattern of being leaked, lost or stolen, has forced security professionals to rethink how their organizations can …
4,900 new Android malware strains discovered every day
“G DATA security experts discovered 440,267 new Android malware strains in the first quarter of 2015, which means that a new mobile malware strain for Android was …
TLS security: What really matters and how to get there
Deploying TLS securely is getting more complicated, rather than less. One possibility is that, with so much attention on TLS and many potential issues to consider, we’re …
How to evaluate the efficiency of a Data Loss Prevention solution
How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient? In this podcast recorded at …
Insider threat: A crack in the organization wall
Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …
IoT developers concerned about privacy and data protection
An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …
How data-centric security works
The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …
Does size matter when it comes to cybersecurity?
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …
Financial impact of SaaS storage breaches now $13.85 million
Elastica analyzed hundreds of millions of enterprise files stored and shared within leading enterprise cloud applications. They identified key trends and insights that reveal …
Featured news
Resources
Don't miss
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy
- Asqav: Open-source SDK for AI agent governance