How important is online privacy?
Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same …
Threats and technologies of a shifting data security landscape
With every email now a target and every piece of data at risk, the need for data protection maturity has never been higher. According a new study released by Lumension, IT …
The impact of new EU security legislation
Based on a survey of organizations from the UK, France and Germany, FireEye found that many organizations in Europe are unprepared for and challenged by cost and complexity of …
Employees would sell passwords for $150
SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …
How the Internet of Things impacts enterprise security
A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study …
Why leaving a shared device unprotected is dangerous
According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …
79% of professionals do business on personal devices
As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …
Why insider threat is thriving
In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint …
Global shortage of skilled cybersecurity pros
A new global survey of more than 3,400 ISACA members shows that 46 percent of respondents expect their organization to face a cyberattack in 2015 and 83 percent believe …
Cybersecurity readiness: Widening gulf between perception and reality
Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …
SQL injection vulnerabilities surge to highest levels in three years
UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …
The cost of malware containment
Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …
Featured news
Resources
Don't miss
- Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
- FreeScout vulnerability enables unauthenticated, zero-click RCE via email (CVE-2026-28289)
- As AI agents start making purchases, security teams must rethink risk
- Engineering trust: A security blueprint for autonomous AI agents
- Webinar: The True State of Security 2026