Organizations have little control over privileged access
Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …
The average DDoS attack tripled in volume
The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the …
UK consumers committed to mobile privacy
Spurred by high-profile data breaches, Edward Snowden’s revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have …
Sensitive data resides in the cloud
With the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to …
Most parents don’t know how to tackle cyber bullying
54 percent of UK parents would have no idea if their child was being cyber bullied, highlighting that most parents are completely ill-equipped and under-educated in knowing …
Mobile app developers are not investing in security
Nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile apps they build for customers. A new …
IT pros are taking action against the insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organizations. Currently 56% of IT professionals in the US …
Security risks of networked medical devices
Networked medical devices linked to the Internet of Things (IoT) hold tremendous promise if security is built in from the outset, according to a new report by Intel Security …
Many admit that passwords are their only IT security measure
New research from SecureAuth shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT …
Smart cities to use 1.1 billion connected things
Increasing urbanization is putting unprecedented pressure on city mayors to constantly balance the challenge of resource constraints against environmental sustainability …
Native Hadoop security tools are not enough
While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough …
The need for information security innovation
The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down