Cybercrime gets easier, attribution gets harder
Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …
Securing high-risk, third-party relationships
High-profile attacks reveal that malicious hackers target third-party vendors and supply chain partners as a backdoor into their primary target, according to CyberArk …
Are you prepared for dealing with a breach?
RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …
What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
What’s complicating your security readiness?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment …
Don’t just deploy a backup solution and hope for the best
Employing a backup solution does not entirely eliminate data loss, according to Kroll Ontrack. The 2015 survey of customers who lost valuable computer data confirms that the …
Consumers would sell personal information for a price
Consumers crave privacy, but do not typically alter actions to protect themselves, according to a global study conducted by the Ponemon Institute. A slight majority of …
Cyber threat intelligence: Perception and use
Most companies believe threat intelligence is essential for a well-rounded cybersecurity defense and has proven effective in stopping security incidents, according to a survey …
Companies now have 1,555 partners in the cloud
Security does not end at the corporate perimeter. After vendors served as entry points in recent high-profile breaches, security vulnerabilities associated with partners have …
Half of companies under DDoS attack have critical data stolen
Neustar surveyed IT professionals from across EMEA to understand the impact of DDoS attacks. 40 percent of companies estimate hourly losses of over £100,000 at peak times …
The importance of backup
Over 75 percent of consumers store their data digitally and more than 50 percent state that their personal data are more valuable than their actual devices – solidifying …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)