Please turn on your JavaScript for this page to function normally.
Shortage of infosec pros equals frequent and costly data breaches

(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 …

Hidden security threats on enterprise networks

Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …

IBM shows where vulnerabilities appear in iOS apps

IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …

25% of DDoS attacks in 2013 will be application-based

Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …

Security is top reason why IT adopts single sign-on

Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …

$400 million risk lurking inside global enterprises

Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …

12.6 million identity fraud victims identified in the U.S.

In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …

How CSOs are enabling secure BYOD

Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …

Chinese Army unit is behind cyber espionage campaigns, researchers claim

Mandiant, the computer forensic and incident response firm that got called in following the recent breaches of the New York Times‘ and Wall Street Journal‘s …

The sophistication of risky apps, mobile misbehavior and spyware

McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …

Most Americans think cyber warfare is imminent

A national survey of Americans shows a majority fear that cyber warfare is imminent and that the country will attack or be attacked in the next decade. Despite the threat, …

Successful ways of undermining cybercrime ecosystems

Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …

Don't miss

Cybersecurity news