Please turn on your JavaScript for this page to function normally.
How secure is your confidential data?

It seems ages ago that companies were first warned about the danger of confidential information being found in trash bags in front of the office, yet despite the use of …

Who to call when hit by a DDoS attack

Recent reports all point to the same fact: despite the different motives of the attackers, DDoS attack have become more frequent and more intense. So what are businesses and …

Twitter’s recipe for security awareness

Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …

How simulated attacks improve security awareness training

Wombat released a new report that discusses how simulated phishing attacks can be an effective security awareness and training tactic to help companies educate employees how …

Cloud-based tool simulates social engineering

TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Facebook’s in-house drills were crucial for smooth response to watering hole attack

Facebook was the first company to admit publicly to have been affected by the recent watering hole attack that started with a compromised forum site popular with mobile …

Users confused about safe use of mobile devices

One in four average mobile users store intimate photos or videos on a smartphone or tablet, but despite the obvious risks to personal privacy if a device is lost or …

CloudLock unveils Community Trust Rating

CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …

Encryption no longer seen as just an IT issue

There has been a steady increase in the deployment of encryption solutions used by organizations over the past eight years. The percentage of overall IT security spending …

Shortage of infosec pros equals frequent and costly data breaches

(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 …

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …

Don't miss

Cybersecurity news