Please turn on your JavaScript for this page to function normally.
Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Killer apps: The performance of networked applications

Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …

Fighting cybercrime is on the right track

Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …

IT security pros have trouble communicating with executives

A Hanover Research survey of 131 information security professionals revealed key differences between the way executive and non-executive IT professionals communicate with …

A spotlight on grid insecurity

Drawing from responses from more than 100 utilities across America, a new report shows that the nation’s electric grid remains highly vulnerable to attacks from Iran and …

Experts highlight top data breach vulnerabilities

Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …

Why BYOx is the next big concern of CISOs

Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …

IT pros focus on cloud security, not hype

Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …

Digital Government Strategy progress and challenges

A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …

Over 45% of IT pros snitch on their colleagues

Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …

Application vulnerabilities still a top security concern

Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …

Internet scams that dominated in 2012

The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …

Don't miss

Cybersecurity news