Please turn on your JavaScript for this page to function normally.
healthcare
Healthcare breaches: Is your data at rest or at risk?

In 2016 healthcare breaches hit an all-time high (328), surpassing the previous record set in 2015 (268), according to Bitglass. Number of breaches Records of approximately …

Users lock
Who’s responsible for secure Internet access?

Americans are divided on key issues around Internet access and responsibility for online privacy, according to AnchorFree. Over two thirds of Americans (68%) say Internet …

email
Majority of workers blindly open email attachments

The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

target
Brands increasingly targeted by false websites and phishing

DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …

DDoS
DDoS attacks: $100,000 per hour is at risk during peak revenue generation periods

Neustar and Harris Interactive conducted global, independent research of 1,010 directors, managers, CISOs, CSOs, CTOs, and other c-suite executives to find out how DDoS …

world
200 million financial services records breached in 2016, 900% increase from 2015

The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …

Windows 10
Windows 10 adoption is accelerating, many concerns remain

The vast majority of IT organizations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption, according to a new …

Samsung
Employees increasingly allowed to move data onto personal mobile devices

Corporate data governance programs are difficult to establish and enforce. For the most part, these programs lack the necessary people, processes and technology to effectively …

people
IT teams struggle with digital transformation skills

New research conducted by Vanson Bourne aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future …

architecture
Cybercrime can come in any shape or size, and not always the form you’d expect

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

vulnerability
NoTrove threat actor delivering millions of scam ads

Researchers at RiskIQ have identified NoTrove, a threat actor that is delivering millions of scam ads that threaten consumers and further undermine the digital advertising …

Security-as-a-Service
Security-as-a-Service: How mid-market companies achieve network security

Mid-tier companies are battling a black hole of time, security expertise, and budget to procure, implement, and manage a variety of security products, according to a study …

Don't miss

Cybersecurity news