Please turn on your JavaScript for this page to function normally.
Mass-scale cleansing of co-opted computing devices

Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …

Key security program and budget data for CISOs

Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …

The security realities of the Internet of Things

SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …

Senior managers are the worst information security offenders

As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …

Top priorities for organisations to counter digital criminality

Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …

What are the most effective means for achieving IT ops excellence?

Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …

How to make malware warnings more effective?

An effective security warning is concrete and clear, appeals to authority, and doesn’t pop up too often, say the results of a study into the psychology of malware …

Consumers trust government bodies more than private organizations?

Despite high profile surveillance and data gathering incidents, consumers still appear to trust government bodies more than private sector organisations when it comes to …

Users more worried about hacking than tracking

Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …

90-day spam campaign turns to Santa in December

Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …

What’s the greatest security risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …

How human behavior affects malware and defense measures

Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools