Breakdown of traditional security models and strategies
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …
What are the legal obligations to encrypt personal data?
A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, …
Big Data needs a data-centric security focus
CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …
Most people have done nothing to protect their privacy
Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to …
How much confidence do financial organizations place in security controls?
The confidence financial organizations place in their security controls is only marginally better than the confidence retailers place in their controls, according to Tripwire. …
Estimating the cost of a cloud data breach
IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …
Most IT admins fear exposure through mobile devices
GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …
Who is the world’s most dangerous footballer?
Portugal’s Cristiano Ronaldo just barely edges out Argentina’s Lionel Messi as the world’s riskiest football player to search for online. According to …
What are the top security concerns of senior IT executives?
Most C-level executives would agree that protecting a company’s confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive …
Too many organizations miss their service availability goals
Continuity Software announced the results of its 3rd annual Service Availability Benchmark Survey, designed to enable IT infrastructure, business continuity and disaster …
Opportunities and challenges for CIOs in different industries
CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …
Why endpoint backup is critical
Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform