SQL injection vulnerabilities surge to highest levels in three years
UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Typosquatting abuse of 500 most popular websites analyzed
A group of researchers from Belgian University of Leuven and US-based Stony Brook University have released the results of their months-long research of typosquatting abuse, …
Employees are still the biggest IT threat
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014, yet the primary reason endpoint security risk has become …
Protecting personal data in the consumer product industry
Eight in 10 consumers (80 percent) say they are more likely to buy from consumer products (CP) companies that they believe protect their personal information, yet only 37 …
Do we need regular IT security fire drills?
IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …
Is IT security stifling innovation and collaboration?
Critical company data is at risk in the UK as a result of organizations focusing their IT security policies and resources more on external threats, such as cybercriminals and …
Security of data in the cloud now an executive-level concern
The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …
Analysis of global defense-in-depth architectures
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That’s the stark conclusion of …
State of the Internet: Attack traffic, DDoS, IPv4 and IPv6
Akamai today released its latest State of the Internet report, which provides insight into key global statistics such as connection speeds and broadband adoption across fixed …
Compromised credentials in enterprise cloud apps
A new Netskope report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given …
Top fraud and corruption trends
Highlighted by a dramatic rise in cyber security risk across all industries, EY Fraud Investigation & Dispute Services (FIDS) unveiled its top fraud and corruption trends …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)