Please turn on your JavaScript for this page to function normally.
Estimating the cost of a cloud data breach

IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …

Most IT admins fear exposure through mobile devices

GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …

Who is the world’s most dangerous footballer?

Portugal’s Cristiano Ronaldo just barely edges out Argentina’s Lionel Messi as the world’s riskiest football player to search for online. According to …

What are the top security concerns of senior IT executives?

Most C-level executives would agree that protecting a company’s confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive …

Too many organizations miss their service availability goals

Continuity Software announced the results of its 3rd annual Service Availability Benchmark Survey, designed to enable IT infrastructure, business continuity and disaster …

Opportunities and challenges for CIOs in different industries

CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …

Why endpoint backup is critical

Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …

Malware creation breaks all records! 160,000 new samples every day

Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …

Healthcare industry lags in security effectiveness

BitSight analyzed Security Ratings for S&P 500 companies in four industries – finance, utilities, retail and healthcare and pharmaceuticals. The objective was to …

Misconfiguration to blame for most mobile security breaches

Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …

8 key cybersecurity deficiencies and how to combat them

While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …

Employee behaviors expose organizations to insider threat

A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …

Don't miss

Cybersecurity news