Malware attacks give criminals 1,425% return on investment
Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2014. They gathered the data from 574 breach investigations the …
Privacy profession: An equal playing field for men and women?
In the midst of the public debate around the lingering gender gap in salary and professional achievement, the International Association of Privacy Professionals (IAPP) …
Does size matter when it comes to cybersecurity?
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …
DDoS attacks now resemble APTs
DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …
IT admin errors that lead to network downtime and data loss
Kroll Ontrack today released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity …
Swift adoption of cloud and mobile drives insider threats
Bitglass surveyed 500 IT and security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months.As more data leaves the network …
Financial impact of SaaS storage breaches now $13.85 million
Elastica analyzed hundreds of millions of enterprise files stored and shared within leading enterprise cloud applications. They identified key trends and insights that reveal …
Massive growth in new ransomware, malware targeting Adobe Flash
“In the first quarter of 2015, McAfee Labs registered a 165 percent increase in new ransomware driven largely by the new, hard-to-detect CTB-Locker ransomware family, a …
90% of DLP violations occur in cloud storage apps
90 percent of data loss prevention (DLP) violations occur in cloud storage apps, and a large percentage of these are for enterprise confidential intellectual property or …
Users care about their privacy, but feel powerless to protect it
Users are resigned to the loss of privacy, but not because they feel they are getting good value for their data, but because they believe marketers will eventually get it …
What’s driving security budgets and technology purchases?
IT security and IT leaders and their staff members do not agree on security objectives, according to findings from a new global Ponemon study.One of the key findings from the …
Social media security is still a low priority
80 percent of IT professionals believe social media is an easy way for hackers to gain access to corporate networks because it is often neglected in terms of security, and …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains