Please turn on your JavaScript for this page to function normally.
face
Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

user
Organizations still unprepared for malicious insiders

Organizations globally believe they are their own worst enemy when it comes to cybersecurity, with 45 percent saying they are ill-equipped to cope with the threat of malicious …

data
My data, my problem

I haven’t seen BlackHat, you know the movie featuring Chris Hemsworth? In fact the list of shows or movies I haven’t seen (or in fact am unlikely to see) is growing as the …

Eyes
58% of orgs have no controls in place to prevent insider threats

More than half of organizations (58 percent) still lack the appropriate controls to prevent insider attacks, with just under half (44 percent) unaware if their organization …

Government IT pros overconfident in insider threat detection

An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place …

secure
Cyber threats today: Significant and diverse

Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, according to Accenture. Of those surveyed, 69 percent …

Nexus
Your nearest and dearest are snooping on your phone

If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you …

person
Organizations unprepared for employee-caused security incidents

While employee-related security risks are the number-one concern for security professionals, organizations are not taking adequate steps to prevent negligent employee …

user
Behavior is the new authentication: A look into the future

In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …

zen
State of security: Human error and remembering the essentials

It seems that in a sea of complex digital ploys, companies are trying so hard to guard against the next big threat that they have forgotten the basics. From years of extensive …

facepalm
Industry reactions to the Mossack Fonseca data breach

The Panama Papers, a collection of 11.5 million files leaked from Panama-based law firm Mossack Fonseca, are now online. The documents show in detail just how exactly the …

Insider threat protection with the DB Networks DBN-6300

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools