Top 10 issues eroding cloud confidence
Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas …
Analysis of nearly 1.7 billion shortened URL links
Web of Trust (WOT) completed an analysis of nearly 1.7 billion shortened URL links and found that the URL shortening services are often used to drive traffic to suspicious …
Nearly 50% organizations experienced document data loss
Nearly half of organizations experienced data loss from the world’s two most used e-mail and enterprise content management applications, Microsoft Exchange Server and …
Dissatisfaction with the current state of backup
ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up …
Most 5 year olds already use an Internet enabled device
Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …
Mobile banking trends and hidden risks
While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
Deconstructing hacktivist operations and tools
Imperva released its September Hacker Intelligence report, which details the latest methods deployed by hackers to execute DDoS attacks by analyzing the technical tools and …
Darwin’s theory applies to malware
G Data’s new malware report shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Real-world software security initiatives study
Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …
Featured news
Resources
Don't miss
- Croatian research institute confirms ransomware attack via ToolShell vulnerabilities
- Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD