Please turn on your JavaScript for this page to function normally.
Connect
How do you ensure success with DevOps?

Only 20 percent of organizations that have attempted to implement DevOps have fully deployed it, according to CA Technologies. Research also found that these …

Red door
Most IT pros oppose government backdoor access

Close to two-thirds of global IT professionals oppose giving governments backdoor access to encrypted information systems, and 59% feel that privacy is being compromised in an …

Privacy
Consumers expect businesses to be more transparent on how their data is used

A global study of consumers reveals 48% are suspicious about how companies use their data. Based on a poll of more than 18,000 consumers across nine countries, the research …

Keyboard
Confusion about IT security leaves devices at risk

When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …

UK map
9% of all ransomware-infected emails target the UK

9.1% of all ransomware-infected emails detected by Bitdefender in 2015 have targeted UK users. Furthermore, 54% of all malware files targeting the UK contained some form of …

Puzzle
Lack of skills and recruiting among challenges facing information security profession

There is a global shortage of skilled cyber security professionals, according to 68 percent of the 435 senior-level technology professionals who completed a recent Cybrary …

User
Human behaviour still the biggest threat to company security

Nuix, a security intelligence and information management technology company, had in-depth conversations with chief information security officers and directors from Fortune 500 …

Coin
Finance teams becoming involved in cyber risk mitigation oversight

CFOs and their finance teams are toughening policies on suppliers and increasing insurance coverage as they are asked take on a larger role in defending their companies from …

architecture
How BitTorrent activity impacts security ratings

BitSight examined BitTorrent P2P file sharing activity of over 30,700 companies. They looked at the percentage of P2P downloads containing malware, the top torrented …

Binary
Infosec pros are moving beyond traditional passwords

Businesses nationwide are increasing their cybersecurity budgets and exploring alternative authentication techniques to passwords, according to a SecureAuth and Wakefield …

Laptop
IT teams expect a nightmare during the holidays

Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. Over one-third of IT professionals in …

Cloud lock
IT use of cloud surges to record heights

The cloud has reached the point where businesses are no longer debating whether or not to use cloud, but how pervasively they will use it. A new North Bridge survey shows …

Don't miss

Cybersecurity news