Please turn on your JavaScript for this page to function normally.
cloud
Only a third of sensitive data stored in cloud-based applications is encrypted

Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive …

Wi-Fi
Wi-Fi hack experiment conducted at Republican National Convention site

Avast security researchers conducted a Wi-Fi hack experiment at various locations around the Republican National Convention site in Cleveland to demonstrate how risky it can …

secure
Companies are unprepared to protect key assets

Knowledge assets are confidential information critical to a company’s core business – other than personal information that would trigger notice requirements under …

wire
Overreliance on perimeter-based defense creates opportunities for attackers

RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …

DDoS
DDoS attacks continue to escalate in both size and frequency

Arbor Networks released global DDoS attack data for the first six months of 2016 that shows a continuing escalation in the both the size and frequency of attacks. …

Search
Most CISOs and CIOs need better resources to mitigate threats

Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff …

bomb
Cybersecurity concern continues to rise

A new Black Hat report reveals some critical concerns about the information security industry and emerging cyber risks faced by today’s enterprises. In 2015, Black Hat …

Business ideas
76% of companies believe IoT is critical to success

Vodafone published its global survey of business sentiment regarding innovation and investment in the Internet of Things. The survey was conducted by Circle Research in April …

payment card
Nearly 1 in 3 consumers victimized by card fraud

Thirty percent of consumers globally have experienced card fraud in the past five years, according to ACI Worldwide and Aite Group. The global fraud study of more than 6,000 …

Users lock
What happens to consumer trust when a business is breached?

In this podcast recorded at Infosecurity Europe 2016, Bill Mann, Chief Product Officer at Centrify, talks about what happens to consumer trust when a business is breached. The …

DDoS
DDoS extortion campaigns increasingly target businesses

80 percent of European IT security professionals expect their business to be threatened with a DDoS ransom attack during the next 12 months, according to Corero Network …

Government IT pros overconfident in insider threat detection

An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place …

Don't miss

Cybersecurity news