Please turn on your JavaScript for this page to function normally.
Sharp increase in blended, automated attacks

FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …

Offshore providers with no cloud strategy risk their future

While the increased use of industrialized services will reduce the volume of traditional and customized services, the impact on offshore providers will be counterbalanced by …

The impact of weak threat intelligence on organizations

A new Ponemon Institute study, which includes a survey of more than 700 respondents from 378 enterprises, defines what “live threat intelligence” is; how global …

Record malware growth in China, Ukraine and Saudi Arabia

51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …

Economic growth and national security are at risk

FTSE 350 companies that are vital to Britain’s economic growth, and crucial to national security, are leaking data that can be used by cyber attackers to gain control of …

Key security metrics revealed

A new Ponemon Institute study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ …

A historical overview of the cyberattack landscape

Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …

The rise of sophisticated malware

A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …

Executives lack confidence in their cyber security

More than two-thirds of executives are concerned their companies will not be able to stop such threats, and one in five say their biggest concern is not knowing whether an …

72% can’t securely manage multiple computing environments

AppSense and CTOVision announced the results of a survey that included responses from 245 executives, technologists and contractors – across the defense, intelligence …

Increase in malicious DNS request traffic

With regard to the OpUSA hacktivist campaign, Solutionary discovered that attackers responsible for previous DDoS attacks on the financial sector leveraged a variety of …

U.S. the number one source of web attacks

Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …

Don't miss

Cybersecurity news