Please turn on your JavaScript for this page to function normally.
IT leaders want greater insight

Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …

BYOD influences enterprise mobile security

The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile …

CEOs lack visibility into seriousness of security threats

CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …

Insider threat as prime security concern

Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …

Growing security demands, old security infrastructure

SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …

The rise of the private cloud

More than half of North American cloud service providers (CSPs) reported that their customers are opting for the private cloud services model, while 32 percent are choosing …

Small businesses not afraid of data breaches

As the number of data breaches involving smaller businesses continues to grow, a new survey by The Hartford finds that 85 percent of small business owners believe a data …

Over 50% use unauthorized file sharing apps at work

While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …

The rise of Tumblr and Google Play spam campaigns

In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …

People would rather lose their wallet than their phone

People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …

Gaps in anti-bribery compliance at multinational corporations

Despite a steady increase in Foreign Corrupt Practices Act (FCPA) investigations and enforcements over the last several years, the majority of corporate compliance officers at …

Most trusted universities for online activity

After analyzing online transactions such as credit applications and e-commerce purchases, iovation found the University of California at San Francisco to be the university …

Don't miss

Cybersecurity news