Monitoring employee behavior in digital environments is rising
Monitoring employee behavior in digital environments is on the rise, with 60 percent of corporations expected to implement formal programs for monitoring external social media …
Database security and SIEM are top priorities
Database security and SIEM are among the top priorities due to increased advanced persistent threats, according to McAfee. Database security has been an ongoing concern for …
Scammers working harder to fool consumers
The number of unique phishing reports submitted to the APWG rose substantially from early fall through the end of the year, while cybercrime gangs were apparently forced to …
Mobile security threats cause confusion
UK and US businesses are in a state of uncertainty around if, and how, to protect their networks against the threats brought about by mobile devices entering the workplace. …
Significant malware increase across all platforms
In Q1, PC malware reached its highest levels in four years, as well as a steep increase in malware targeting the Android platform. Mac malware was also on the rise, indicating …
Financial fraud drives most targeted attacks
Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …
BYOD adoption is growing despite security concerns
While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …
What security wants most from Big Data
More than two thirds of IT people think Big Data should be a strategic priority, according to Varonis. More than half expect Big Data to be a strategic initiative over the …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
How executives understand and manage IT risks
Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, …
A marathon of holiday spam
The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do