Please turn on your JavaScript for this page to function normally.
70% of teens hide their online behavior

When it comes to using the Internet, teens are not only engaging in risky behaviors, but how they are hiding it from their parents, many of whom don’t realize they are …

Most senior managers don’t know where their data is

67% of respondents say that senior management in their organizations either don’t know where all company data resides or are not sure, according to Varonis. In addition, …

User education essential against social engineering attacks

The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …

Older means wiser to computer security

A new Dimensional Research and ZoneAlarm report found that 18 – 25s are more confident in their security knowledge than 56 – 65s, but have experienced more …

Online file sharing poses great security risks

As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …

Big Data skilled professionals in demand

The shortage of Big Data skilled professionals is driving the need for collaborative self-service access to Hadoop across companies of all sizes, according to Karmasphere. …

BYOD workers pose serious security risks

Fortinet conducted a global survey that reveals the extent of the challenge posed to corporate IT systems by first generation Bring Your Own Device (BYOD) users; people …

UK businesses worst in Europe at protecting information

Mid-sized businesses in the UK are Europe’s worst performers when it comes to managing information risk, according to research from Iron Mountain and PwC. The study …

Increase in cyber threats and sabotage on critical infrastructure

The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …

Real life examples on hackers bypassing CAPTCHA

Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …

SAP security vulnerabilities, metrics and threats

A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …

IT leaders want greater insight

Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …

Don't miss

Cybersecurity news