Please turn on your JavaScript for this page to function normally.
96 percent of apps have security vulnerabilities

Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …

Mobility is the weakest security link

Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …

Most non-IT employees don’t “get” company IT security policies

DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …

Microsoft releases BYOD best practices for enterprise workers

Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …

Companies embrace the cloud and BYOD, can’t control them

Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …

CIOs lack the vision when it comes to mobility

Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …

Experts offer cyber security forecast for the year ahead

Kroll released its third annual Cyber Security Forecast, a prediction of the most significant cyber issues organizations will confront in 2014. The latest forecast highlights …

Top six security threats for 2014

The Information Security Forum (ISF) has announced their forecast of the top six security threats global businesses will face in 2014. Key threats include BYOD trends in the …

BYOD is an applications strategy, not just a purchasing policy

Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …

Are tablets secure enough for business?

Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …

IT pros unsure of security risks when using remote support tools

Research from Bomgar and Ovum surveyed 300 IT decision-makers across the UK, France and Germany, focusing on the challenges faced by enterprise companies that provide remote …

Cyber threats organisations will deal with in 2014

The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, …

Don't miss

Cybersecurity news