Consumers think passwords are of no value to criminals
21 percent of respondents to a Kaspersky survey assume their passwords are of no value to criminals. Many often take the easy way out when creating and storing passwords. For …
Key trends and opportunities in the information security profession
Companies and organizations are increasingly struggling to manage threats, avoid errors and are taking longer to recover from cyberattacks. The results of the (ISC)2 Global …
How IT pros protect and investigate their endpoints
More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. …
1 in 4 employees enable cloud attacks
While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …
Internet of Everything attack surface grows
The proliferation of more than 16 billion connected computing devices today has significantly expanded the attack surface of our interconnected world. Unauthorized, BYOD, …
What IT skills are in demand?
More than 11,000 IT and business professionals in North America responded to the eighth annual IT Skills and Salary Survey by Global Knowledge and Windows IT Pro. Key …
Perception and reality of perimeter security effectiveness
A widening gap is emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing …

Lack of skilled infosec pros creates high-risk environments
82 percent of organizations expect to be attacked in 2015, but they are relying on a talent pool they view as largely unqualified and unable to handle complex threats or …
Key trends for risk-prone behavior in the workforce
Businesses are ill prepared for the high-risk, high-growth mindset of the GenMobile workforce, creating alarming disparity around security practices in the corporate world. …
Compromised credentials haunt cloud app usage
Netskope found that more than seven out of ten uploads from users with compromised accounts are to apps with a “poor” rating in the Netskope Cloud Confidence …
Main sources of data breaches: Phishing, RAM scrapers, web app insecurity
US telecom giant Verizon has published its 2015 Data Breach Investigations Report, which is based on an analysis of nearly 80,000 security incidents, including more than 2,100 …
Attackers use deceptive tactics to dominate corporate networks
Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec. …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)