Please turn on your JavaScript for this page to function normally.
Insider threat: A crack in the organization wall

Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …

IoT developers concerned about privacy and data protection

An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …

86.2 million phone scam calls delivered each month in the U.S.

Phone fraud continues to threaten enterprises across industries and borders, with the leading financial institutions’ call centers exposed to more than $9 million to potential …

Exposing cyberattacks targeting government networks in Southeast Asia

Palo Alto Networks uncovered a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. Help …

How trustworthy are the world’s leading websites?

The Online Trust Alliance (OTA) evaluated nearly 1,000 websites, grading them based on dozens of criteria in three categories: consumer protection, privacy and security.Their …

90% of companies benefit from Big Data

Enterprise Big Data strategies are delivering key benefits to organizations despite noted challenges in implementation, according to CA Technologies.Nine in 10 organizations …

Malware attacks give criminals 1,425% return on investment

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2014. They gathered the data from 574 breach investigations the …

Privacy profession: An equal playing field for men and women?

In the midst of the public debate around the lingering gender gap in salary and professional achievement, the International Association of Privacy Professionals (IAPP) …

Does size matter when it comes to cybersecurity?

RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …

DDoS attacks now resemble APTs

DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …

IT admin errors that lead to network downtime and data loss

Kroll Ontrack today released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity …

Swift adoption of cloud and mobile drives insider threats

Bitglass surveyed 500 IT and security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months.As more data leaves the network …

Don't miss

Cybersecurity news