Please turn on your JavaScript for this page to function normally.
Fire
A third of organizations experienced a data breach in the past 12 months

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter …

Keyboard
Digital businesses will suffer for inability to manage risk

As organizations transition to digital business, a lack of directly owned infrastructure and services outside of IT’s control will need to be addressed by cybersecurity. …

tools
It takes 248 days for IT businesses to fix their software vulnerabilities

Compiled using data collected from tens of thousands of websites, a new WhiteHat Security report reveals that the majority of web applications exhibit, on average, two or more …

programmer
Do companies take customers’ security seriously?

75 percent of adults in the UK would stop doing business with, or would cancel membership to, an organisation if it was hacked. This suggests, however, that a quarter would …

tunnel
Proactive threat hunting: Detect, isolate and eradicate

Organizations worldwide wait until they fall victim to a damaging cyber attack before engaging a provider of managed security services, or MSS, according to Raytheon. …

bomb
789% year-over-year spike in malware and phishing

An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the …

Biohazard
Unsurprisingly, malware incidents set to grow

Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

touchscreen
Surprise! Most IoT products have inadequate security

While the IoT era of products brings innumerable advances and modern conveniences to the lives of consumers, the connected nature of these products creates unintentional ports …

bridge
Are you prepared for future information management requirements?

While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …

hard drive
Mobile workforce exposes businesses to security vulnerabilities

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …

criminal
Global profiles of the typical fraudster

Technology is an important tool to help companies fight fraud, but many are not succeeding in using data analytics as a primary tool for fraud detection. Meanwhile, fraudsters …

market
Growing advanced threats will augment the IT security market through 2020

Research analysts are forecasting positive growth for many segments of the global IT security market over the next four years as several markets including BYOD security, …

Don't miss

Cybersecurity news