Please turn on your JavaScript for this page to function normally.
Advanced attackers go undetected for 229 days

A new FireEye report details the tactics used by threat actors to compromise organizations and steal data. It also highlights emerging global threat actors, their suspected …

Most cloud services are putting businesses at risk

A new Skyhigh Networks report analyzes usage data from more than one million users across more than 40 companies spanning the financial services, healthcare, high technology, …

The state of remote access security

At the end of 2013, HOB conducted a survey of more than 200 CIOs and CTOs in the U.S. The survey quantified the trends and challenges IT decision makers experience when …

The digital universe will reach 44 trillion gigabytes by 2020

A new EMC study reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the …

Breaches expose 552 million identities in 2013

After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security …

Email management lacks innovation, businesses turn to cloud

SolarWinds released survey results highlighting the growing challenge organizations face managing email in an increasingly complex environment where BYOx, mobility and other …

56% of employees still receive no security awareness training

A new research survey by EMA takes you inside today’s organizations to reveal how employee decisions related to information security can significantly increase …

Attitudes about best practices for physical access control

An HID Global survey of 600 respondents revealed enterprise end users’ perceptions about change and the importance of industry best practices, and how well today’s …

Businesses create IT security blind spots

New research shows that 54 percent of companies in the UK are using incorrect metrics when trying to determine their IT security status, providing a false picture of the …

Emerging trends in cyber-attack methodology

Websense documented the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber-attacks. “Cybercriminals continue to …

Public WiFi users regularly access sensitive info

A considerable portion of U.S. adults who’ve ever used free public WiFi say they have accessed sensitive information while using it. According to a PRIVATE WiFi survey, …

Organizations need data analytics to tackle supply chain fraud

As complexity in global supply chain networks continues to increase, less than one-third (26 percent) of business executives are using data analytics tools and processes to …

Don't miss

Cybersecurity news