cybersecurity
Digital transformation, regulations impacting data security decisions at financial organizations
Almost half (49%) of global financial services organisations have experienced a data breach in the past, according to the 2017 Thales Data Threat Report, Financial Edition. …
Companies turn a blind eye to open source risk
Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …
Using a robust platform for cyber threat analysis training
We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …
Why wait to be breached? Three reasons to secure your data now
“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …
Four ways colleges can strengthen their cybersecurity programs
If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …
DDoS attacks: Brands have plenty to lose, even if attacked only once
DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage on brands. Neustar discovered that brands experienced a …
Inventive cyber gang steals millions from East European banks
Trustwave researchers have uncovered a series of ingenious bank heists that cost several Eastern European and Russian banks up to $10 millions each, and they believe financial …
Main cybersecurity problem for colleges? Gathering diverse kinds of data
Each time a major retailer, credit bureau or healthcare provider experiences a significant data breach, even the experts in cybersecurity circles wonder, “What could be …
Hackers go after Australian ICT, managed services providers
The Australian Cyber Security Centre (ACSC), which integrates the national security cyber capabilities and serves as a hub for collaboration and information sharing with the …
Accenture inadvertently exposes highly sensitive corporate, client data online
Corporate consulting giant Accenture left bucketloads of sensitive corporate and client data exposed online for anyone to access. Luckily for them, it seems that UpGuard …
Do board members treat cybersecurity as a top priority?
Despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world still believe that business …
Leaving employees to manage their own password security is a mistake
Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …
Featured news
Resources
Don't miss
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity
- Stratoshark: Wireshark for the cloud – now available!