Please turn on your JavaScript for this page to function normally.
Life after TrueCrypt

While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …

Top 10 most trustworthy online retailers

The Online Trust Alliance (OTA) announced today the results of its 2014 Online Trust Audit. Out of nearly 800 top consumer websites evaluated, 30.2 percent made the Honor …

Mobile apps will have a significant impact on information infrastructure

With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner …

Security at higher education institutions

SANS announces results of its inaugural survey of security in institutions of higher education, in which nearly 300 higher education IT professionals answered questions about …

Retail breaches and the SQL injection threat

Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …

Businesses are not ready for PCI DSS 3.0

Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards …

$445 billion lost due to cybercrime?

Cybercrime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cybercrime costs …

Most comment spam traffic is generated by 28% of attackers

Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the …

Breakdown of traditional security models and strategies

Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …

What are the legal obligations to encrypt personal data?

A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, …

Big Data needs a data-centric security focus

CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …

Most people have done nothing to protect their privacy

Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to …

Don't miss

Cybersecurity news