Security concerns are still holding back cloud adoption
There are significant differences in public cloud infrastructure concerns between the cloud-wise, organizations that are currently using cloud services, and the cloud-wary, …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
One in five SMB retailers lacks security fundamentals
Fortinet published new research that shows where SMB retailers stand in regards to compliance regulations, security policies and new technologies that help manage big data and …
Mass-scale cleansing of co-opted computing devices
Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
The security realities of the Internet of Things
SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …
Senior managers are the worst information security offenders
As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …
Top priorities for organisations to counter digital criminality
Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …
What are the most effective means for achieving IT ops excellence?
Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …
How to make malware warnings more effective?
An effective security warning is concrete and clear, appeals to authority, and doesn’t pop up too often, say the results of a study into the psychology of malware …
Consumers trust government bodies more than private organizations?
Despite high profile surveillance and data gathering incidents, consumers still appear to trust government bodies more than private sector organisations when it comes to …
Users more worried about hacking than tracking
Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware