
Malicious spam volume hits two year high
According to the Kaspersky Lab Spam and Phishing in Q3 report, the company’s products blocked 73,066,751 attempts to attack users with malicious attachments. This is the …

The cybersecurity gap between IT capabilities and business expectations
Deloitte has uncovered a shift in business priorities from “business performance” to “customers,” with 57 percent of chief information officers …

Will security concerns negatively impact the online holiday shopping season?
In a survey of over 1,900 consumers crossing the US and UK, Computop found 76 percent planned to shop online this holiday season. However, 62 percent of those respondents …

Number of vulnerable enterprises at five year record high
Enterprises across the globe are refreshing their network equipment earlier in its lifecycle in a move to embrace workplace mobility, Internet of Things, and software-defined …

Increasing number of financial institutions falling prey to cyber attacks
66.2 percent of financial organizations faced at least one cybersecurity attack in the last year, according to MetricStream Research. The report, based on a survey conducted …

Half of EMEA CIOs participating in a digital ecosystem
CIOs in Europe, the Middle East and Africa (EMEA) are clearly engaging with the era of digital business, with 50 percent participating in a digital ecosystem and 65 percent …

Retailers overconfident in endpoint security
A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to …

10 predictions on IT changes over the next 36 months
Today’s IT organizations are divided into two camps: those that thrive by effectively leveraging digital technologies, new business models, and entrepreneurial cultures; …

Nigerian scammers: Then and now
The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing …

Overconfidence is putting organizations at higher risk for attacks
In the past twelve months, roughly one in three targeted attacks resulted in an actual security breach, which equates to two to three effective attacks per month for the …

Most activity on the dark web is legal and mundane
Terbium Labs has conducted a data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. Total …

Merchants and financial institutions deal with escalating cyber attacks
Unsurprisingly, the Q3 2016 ThreatMetrix report shows a sharp increase in the number and complexity of cyber attacks. During what is traditionally a slow quarter, researchers …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)