Please turn on your JavaScript for this page to function normally.
Surge in mobile exploits and shell command injection attacks

IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …

Risk across the phases of application security

A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Malware sophistication worries IT leaders

More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …

The evolution of malware and the threat landscape

The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …

Data protection risks on mobile devices

An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …

Big gaps in backup plans

Small businesses are using a variety of technologies to back up data including some antiquated methods that leave the backup process incomplete and susceptible to information …

Higher education breaches significantly down

In a year highlighted by the biggest data security breaches on record, the higher education vertical appears to have had a reprieve relative to prior years in terms of overall …

Contradictions in security perception vs. reality

McAfee announced the State of Security report showing how IT decision-makers view the challenges of securing information assets in a highly regulated and increasingly complex …

Privacy concerns impacting what people buy

Concerns about data security and privacy are impacting what people buy and which companies they do business with, according to a new Edelman study. Data security and privacy …

CIO concerns over mobile data security

UK CIOs and IT managers are increasingly concerned about data protection on mobile devices, according to Sophos. Three quarters of those surveyed have had to deal with lost or …

Major phishing contributors and enablers

Agari announced the first Annual Sumo Awards to dishonor phishing’s biggest contributors and enablers. The Sumo Awards categories identify why phish emails succeed, …

Don't miss

Cybersecurity news