15 percent of companies have no BYOD policy
ThreatMetrix announced results of a study that surveyed U.S. business managers and IT executives within retail and financial services organizations on their level of …
Abrupt drop in Symbian malware
In what may be the only good news for Symbian, F-Secure’s latest Mobile Threat Report shows a drop in malware targeting the declining platform to just four percent of …
99 percent of web apps vulnerable to attack
A new Cenzic report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99 percent of applications …
Conflicting views on cloud security responsibility
CA and the Ponemon Institute released a study that shows companies have improved their practices around cloud computing security compared to a previous study from 2010. Still, …
Security is changing, organizations are unprepared
F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. …
Firewall management now concentrated on secure application connectivity
Tufin Technologies announced the results of its annual Firewall Management Survey at RSA Conference 2013 in San Francisco. 200 network security professionals reported that …
Security breaches remain undiscovered and unresolved for months
At RSA Conference 2013 in San Francisco, Solera Networks announced the results of the Ponemon Institute’s 2013 report, “The Post Breach Boom,” which revealed …
3 out of 4 infosec pros unsure they would spot a breach
LogRhythm announced the results of its 2nd Annual Cyber Threat Readiness Survey of 150 IT security professionals on their organizations’ readiness to address advanced …
Investors demand more transparency about corporate cyberattacks
More than 70 percent of American investors are interested in reviewing public company cybersecurity practices and nearly 80 percent would not likely consider investing in a …
Big Data capabilities crucial for effective cyber defense, says study
A study from a top cybersecurity analyst firm confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, …
Shortage of infosec pros equals frequent and costly data breaches
(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
Featured news
Resources
Don't miss
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable