Please turn on your JavaScript for this page to function normally.
Data breaches and high-risk vulnerabilities continue to dominate

Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …

How fast can security pros detect a breach?

Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …

Only 1 in 100 cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from Skyhigh Networks, suggests that only 1 in 100 cloud …

Do CISOs deserve a seat at the leadership table?

ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …

PCI compliance contributes to false sense of security

Despite industry data to the contrary, a new Tripwire retail cybersecurity survey indicates that organizations that rely on PCI compliance as the core of their information …

PC gamers increasingly under attack

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …

IoT devices are filled with security flaws, researchers warn

We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our …

375 million customer records compromised in 2014

Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …

97% of Global 2000 remain vulnerable to due to Heartbleed

97 percent of Global 2000 organizations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation, according to Venafi. This …

Android ransomware attacks on the increase

CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …

The value of Bring Your Own Identity

New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …

What influences corporate security strategies?

Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …

Don't miss

Cybersecurity news