Transforming security processes to manage cyber risks
RSA, The Security Division of EMC, released the latest SBIC report, providing guidance for how organizations can enable new competitive advantages in their business by …
Smarter cyber crime forces industry to change
Sophos released its latest Security Threat Report which outlines the significant changes in cyber criminal behavior over the course of last year and a forecast for their …
What threats will dominate 2014?
Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and …
The state of targeted attacks
Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners …
Over 80% of employees use unauthorized apps at work
More than 80 percent of employees admit to using non-approved SaaS applications in their jobs, say the results of a McAfee survey. But what’s even more interesting is …
9 out of 10 consumers would rather companies didn’t store their info
In the wake of data scandals, consumer trust in data security has hit a ten year low, with over 1 in 10 suffering from a data loss, Fujitsu’s data research report has …
Passwords aren’t going away any time soon
Despite nearly weekly revelations of new password database breaches, a survey by Authentify suggests that passwords will remain the primary protection for online accounts. Of …
Shopping convenience overrides security concerns
Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …
Browser scan unveils an abundance of critical vulnerabilities
Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …
Malware creation hits record-high numbers
PandaLabs has published the results of its Quarterly Report for Q3 2013. One of the main conclusions that can be drawn from this global study is that malware creation has hit …
The rise of unsolicited and malicious emails
October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …
Do large companies follow encryption best practices?
Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains