Please turn on your JavaScript for this page to function normally.
Conflicting views on cloud security responsibility

CA and the Ponemon Institute released a study that shows companies have improved their practices around cloud computing security compared to a previous study from 2010. Still, …

Security is changing, organizations are unprepared

F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. …

Firewall management now concentrated on secure application connectivity

Tufin Technologies announced the results of its annual Firewall Management Survey at RSA Conference 2013 in San Francisco. 200 network security professionals reported that …

Security breaches remain undiscovered and unresolved for months

At RSA Conference 2013 in San Francisco, Solera Networks announced the results of the Ponemon Institute’s 2013 report, “The Post Breach Boom,” which revealed …

3 out of 4 infosec pros unsure they would spot a breach

LogRhythm announced the results of its 2nd Annual Cyber Threat Readiness Survey of 150 IT security professionals on their organizations’ readiness to address advanced …

Investors demand more transparency about corporate cyberattacks

More than 70 percent of American investors are interested in reviewing public company cybersecurity practices and nearly 80 percent would not likely consider investing in a …

Big Data capabilities crucial for effective cyber defense, says study

A study from a top cybersecurity analyst firm confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, …

Shortage of infosec pros equals frequent and costly data breaches

(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 …

Hidden security threats on enterprise networks

Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …

IBM shows where vulnerabilities appear in iOS apps

IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …

25% of DDoS attacks in 2013 will be application-based

Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …

Security is top reason why IT adopts single sign-on

Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …

Don't miss

Cybersecurity news