Please turn on your JavaScript for this page to function normally.
DDoS
DDoS attacks: $100,000 per hour is at risk during peak revenue generation periods

Neustar and Harris Interactive conducted global, independent research of 1,010 directors, managers, CISOs, CSOs, CTOs, and other c-suite executives to find out how DDoS …

world
200 million financial services records breached in 2016, 900% increase from 2015

The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …

Windows 10
Windows 10 adoption is accelerating, many concerns remain

The vast majority of IT organizations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption, according to a new …

Samsung
Employees increasingly allowed to move data onto personal mobile devices

Corporate data governance programs are difficult to establish and enforce. For the most part, these programs lack the necessary people, processes and technology to effectively …

people
IT teams struggle with digital transformation skills

New research conducted by Vanson Bourne aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future …

architecture
Cybercrime can come in any shape or size, and not always the form you’d expect

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

vulnerability
NoTrove threat actor delivering millions of scam ads

Researchers at RiskIQ have identified NoTrove, a threat actor that is delivering millions of scam ads that threaten consumers and further undermine the digital advertising …

Security-as-a-Service
Security-as-a-Service: How mid-market companies achieve network security

Mid-tier companies are battling a black hole of time, security expertise, and budget to procure, implement, and manage a variety of security products, according to a study …

bomb
Phishing attacks responsible for three-quarters of all malware

With phishing now widely used as a mechanism for distributing ransomware, a new NTT Security reveals that 77% of all detected ransomware globally was in four main sectors – …

users
Security skills need to be deep and wide to mitigate critical risks

Businesses recognize security as a growing imperative, but many remain on the defensive, fighting cyber threats with dated tactics and training, according to CompTIA. …

decision
A third of employees say it’s common to take corporate data with them when leaving a company

Today’s workforce is caught between two imperatives: be productive and efficient on the job and maintain the security of company data. The results of a recent end-user …

BlackDuck
Organizations are not effectively dealing with open source security threats

Black Duck conducts hundreds of open source code audits annually, primarily related to Merger & Acquisition transactions. Its Center for Open Source Research & …

Don't miss

Cybersecurity news