Retail breaches and the SQL injection threat
Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …
Businesses are not ready for PCI DSS 3.0
Many U.S. businesses are unprepared for the Payment Card Industry Data Security Standard 3.0, or PCI DSS 3.0, as issued by the Payment Card Industry Security Standards …
$445 billion lost due to cybercrime?
Cybercrime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cybercrime costs …
Most comment spam traffic is generated by 28% of attackers
Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the …
Breakdown of traditional security models and strategies
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …
What are the legal obligations to encrypt personal data?
A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, …
Big Data needs a data-centric security focus
CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …
Most people have done nothing to protect their privacy
Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to …
How much confidence do financial organizations place in security controls?
The confidence financial organizations place in their security controls is only marginally better than the confidence retailers place in their controls, according to Tripwire. …
Estimating the cost of a cloud data breach
IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …
Most IT admins fear exposure through mobile devices
GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …
Who is the world’s most dangerous footballer?
Portugal’s Cristiano Ronaldo just barely edges out Argentina’s Lionel Messi as the world’s riskiest football player to search for online. According to …
Featured news
Resources
Don't miss
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac
- CISO 3.0: Leading AI governance and security in the boardroom
- Review: Metasploit, 2nd Edition
- Security awareness training isn’t stopping breaches. Can AI help?