Raw threat data is not effective, it’s time for threat intelligence
A new Ponemon Institute survey includes insight from 692 IT and IT security professionals from both global businesses and government agencies, who answered more than …
Hard-hitting insights into global attacks targeting organizations
After collecting and analyzing data, based on a comprehensive review of incident response investigations conducted over the past three years on behalf of organizations across …
The value in vulnerability management platforms
A study conducted by Forrester Consulting assessed IT decision makers’ satisfaction with their current vulnerability management platforms and the challenges companies …
Most consumers believe cloud-based apps can be hacked
Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, …
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
China is the top target for DDoS reflection attacks
China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …
Most are unaware of the seriousness of medical data theft
Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.In a reflection DDoS …
Are IT security pros optimistic or naïve?
Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …
Social experiment: 200 USB flash drives left in public locations
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …
One in 20 apps on private PCs are end-of-life
Secunia Research revealed the state of security for PC users in a total of 14 countries, including the US. One in 20 applications on private US PCs are end-of-life and 12 …
Featured news
Resources
Don't miss
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)
- Alleged Rapper Bot DDoS botnet master arrested, charged