Please turn on your JavaScript for this page to function normally.
Retail breaches and the SQL injection threat

Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …

Businesses are not ready for PCI DSS 3.0

Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards …

$445 billion lost due to cybercrime?

Cybercrime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cybercrime costs …

Most comment spam traffic is generated by 28% of attackers

Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the …

Breakdown of traditional security models and strategies

Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …

What are the legal obligations to encrypt personal data?

A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, …

Big Data needs a data-centric security focus

CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …

Most people have done nothing to protect their privacy

Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to …

How much confidence do financial organizations place in security controls?

The confidence financial organizations place in their security controls is only marginally better than the confidence retailers place in their controls, according to Tripwire. …

Estimating the cost of a cloud data breach

IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …

Most IT admins fear exposure through mobile devices

GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …

Who is the world’s most dangerous footballer?

Portugal’s Cristiano Ronaldo just barely edges out Argentina’s Lionel Messi as the world’s riskiest football player to search for online. According to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools