Please turn on your JavaScript for this page to function normally.
Dynamic hacking risks target web application security

Web applications remain the third most common attack vector overall, with hacking still on the increase, from organized criminal groups, amateurs and political activists. …

Savviest North American cities for online security

AVG announced the results of a survey of 15 key U.S. and Canadian cities to determine which is the savviest when it comes to defense against online threats. The winner: …

Cybercrime costs consumers $110 billion

With findings based on self-reported experiences of more than 13,000 adults across 24 countries, the 2012 edition of the Norton Cybercrime Report calculates the direct costs …

Service desks not equipped to deal with BYOD

A majority of company IT support teams are either unable or unwilling to support their employees who want to bring their own device (BYOD) to work, according to a survey by …

Cybercriminals use throw-away domains to infiltrate enterprise networks

The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …

UK data breaches up 1000% in five years

Imation today released figures obtained through a request under the Freedom of Information Act which show that data breach numbers in the UK have increased by more than 1000% …

Key challenges in proactive threat management

There is a downward trend in IT’s ability to consistently coordinate, measure and improve security data management processes, including log management, compliance …

Cloud adoption generates security issues

Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security …

Map of state data breach notification laws

Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …

BYOD is not for every company, or every employee

The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …

Cyber incident reporting in the EU

ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …

Changing risk assessment practices

Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But …

Don't miss

Cybersecurity news