Please turn on your JavaScript for this page to function normally.
The true scale of the insider threat

UK employees are likely to either maliciously or accidentally disclose confidential information about their employers to unauthorized personnel. A LogRhythm survey of 3000 UK …

Data breach mistakes feared more than attackers

Seventy percent of compliance professionals feel that their organizations are well or very well prepared to fend off malicious hacker attacks, however, their confidence wanes …

Top cybercrime weapon: Web exploit toolkits

HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …

Vulnerabilities in common web applications escalate

A new Cenzic report reveals widespread Web application vulnerabilities, with 2,155 discovered – a third of which have both no known solution and an exploit code publicly …

Half of U.S. tax payers are unaware about identity theft risks

While consumers take steps to protect themselves against identity theft and remain concerned about the possibility of a data breach when sharing their personal information, …

Vulnerabilities surge: 8,000 recorded in 2010

IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …

Key security experts unfamiliar with DNSSEC

Half of IT personnel in charge of Internet security at the world’s largest organizations either haven’t heard of DNSSEC or have limited familiarity with it, …

Global spam drops by a third as Rustock botnet is dismantled

Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …

Intellectual capital is the new cybercrime currency

Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …

The crucial role of crypto technologies

Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …

73,000 malware strains created daily in 2011

The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …

Complexity as the leading security issue

Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …

Don't miss

Cybersecurity news