470 million sites exist for 24 hours, 22% are malicious
Blue Coat researchers analyzed more than 660 million unique hostnames requested by 75 million global users over a 90-day period. They found that 71 percent of the hostnames, …
More students bringing mobile devices to class
Just like professionals, more and more students are taking their own devices with them. BYOD, a trend in the business world, is also gaining popularity in schools. With …
51% of consumers share passwords
Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …
Infographic: Major security skills shortages
Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …
Infographic: Honeypot cloud security data
New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries. Recent data reveals that China and India are attacking U.S. servers …
86% of hackers don’t worry about repercussions
Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face …
IT has no choice but to embrace BYOD
Bring-Your-Own-Device (BYOD) and Bring-Your-Own-App (BYOA) trends started as a clandestine effort by employees to work more efficiently and grew rapidly. Since they …
How security practitioners deal with incident response
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response, according to a new SANS survey. …
Data breaches and high-risk vulnerabilities continue to dominate
Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …
How fast can security pros detect a breach?
Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …
Only 1 in 100 cloud providers meet proposed EU Data Protection requirements
The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from Skyhigh Networks, suggests that only 1 in 100 cloud …
Do CISOs deserve a seat at the leadership table?
ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …