Please turn on your JavaScript for this page to function normally.
IT security pros most afraid of highly publicized attacks

Concerns over hacktivism and targeted state-sponsored attacks are at the top of security professionals’ minds according to a new survey and research report sponsored by …

HP identifies the sophistication of security attacks

HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …

How cybercriminals are infecting networks

Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …

The importance of ethical hacking

The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …

Most IT admins considered switching careers due to stress

67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the …

Businesses unable to comply with EC 24 hour breach notification

UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …

Most parents secretly access teens’ Facebook accounts

For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …

Mobile phones expose businesses to massive risks

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …

Big data disruptions can be tamed

Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big …

Is online banking like playing Russian Roulette?

Four out of ten consumers suspect they are playing with fire conducting financial transactions online, according to Entersekt. The study of 1,000 people, found that while the …

Poor internal security processes spell disaster

Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

Don't miss

Cybersecurity news