Please turn on your JavaScript for this page to function normally.
Rise in DDoS reflection attacks using abandoned routing protocol

There’s been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai.RIPv1 is a …

Confidence in antivirus falls to all-time low

While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …

Security concerns continue to dog the cloud industry

Executives at major North American companies believe conventional network security solutions aren’t enough to protect their cloud computing environments, especially when it …

4 in 10 midsize businesses have experienced a data breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …

Energy security pros: More competent, or just naive?

Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …

Hackers are spending a huge amount of resources targeting financial services

Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous …

Businesses know about POS security risks, but are they investing wisely?

The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …

Who fixes the most vulnerabilities?

Web and mobile applications produced or used by government organizations are more likely than those in other industries to fail standard security policies like the OWASP Top …

How lack of trust and limited knowledge impact your organization

There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security …

How engaged is the average board when it comes to security?

Tripwire evaluated the attitudes of executives as they relate to cybersecurity risk decision-making and communication between IT security professionals, executive teams and …

Insider threat: A crack in the organization wall

Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …

IoT developers concerned about privacy and data protection

An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …

Don't miss

Cybersecurity news