Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
63% of businesses don’t encrypt credit cards
In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known …
49% of security pros think Java apps are vulnerable to attacks
In a recent poll, half of the senior IT professionals polled said their Java applications are vulnerable (32%) or very vulnerable (17%) to attacks. They cited insecure coding …
Unlocking the hidden value of information
Unstructured content accounts for 90% of all digital information. This content is locked in a variety of formats, locations, and applications made up of separate repositories, …
Most dangerous superheroes to search for online
Though he has spent years fighting for good in comic books and on the big screen, Superman has emerged as one of the web’s biggest villains as he comes top in …
100+ DDoS events over 100GB/sec reported this year
Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure. The data shows an unparalleled number of volumetric attacks in the …
96% of organizations hit by a security incident in the past year
A new ForeScout report revealed that more than 96 percent of organizations experienced a significant IT security incident in the past year. The majority of IT organizations …
Amazon-hosted malware triples in 6 months
Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top …
Empowered Millennials expect BYOD
New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well …
Businesses are deprioritizing information security
Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the …
Exploring the BYOD security dynamic
Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives. The initial survey, conducted in …
Consumers don’t trust any industry with their personal data
U.S. consumers have little faith that companies are able to keep their person data safe. The sentiment crosses nearly all industries with consumers saying that the lack of …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains