Please turn on your JavaScript for this page to function normally.
Key trends for risk-prone behavior in the workforce

Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …

Compromised credentials haunt cloud app usage

Netskope found that more than seven out of ten uploads from users with compromised accounts are to apps with a “poor” rating in the Netskope Cloud Confidence …

Main sources of data breaches: Phishing, RAM scrapers, web app insecurity

US telecom giant Verizon has published its 2015 Data Breach Investigations Report, which is based on an analysis of nearly 80,000 security incidents, including more than 2,100 …

Attackers use deceptive tactics to dominate corporate networks

Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec. …

The key challenges to timely incident response

Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …

A look at emergent threats and their influence

Analyzing Dell data sources and the 2014 threat landscape, their new report found a surge in point-of-sale (POS) malware, increased malware traffic within encrypted (https) …

Cloud security: CA conducts advanced research

CA Labs is conducting research and development for innovative solutions to address security challenges in multi-cloud environments. Horizon 2020 awarded a contract to the …

Are privileged users the most dangerous insider?

92 percent of healthcare IT decision makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49 percent felt very or extremely …

Phishers increasingly target banks and ISP accounts

Phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014, according to the APWG. The number of brands being attacked remains high, …

Preventing and detecting insider threats

SANS surveyed 772 IT security professionals regarding their experiences preventing and detecting insider threats within their organizations. Although 74 percent are concerned …

Worldwide IT spending to decline in 2015

Worldwide IT spending is set to shrink to $3.66 trillion in 2015, a 1.3 percent decrease from 2014, according to the latest forecast by Gartner. “We forecast …

Cybercrime gets easier, attribution gets harder

Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …

Don't miss

Cybersecurity news