Please turn on your JavaScript for this page to function normally.
Content-related threats cause significant data loss

Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …

Cloud computing as key to improved data protection

More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …

IT is embracing BYOD

IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …

Online travel most vulnerable to email attacks

Agari released its first TrustIndex, a quarterly measurement that applies Agari’s big data insights to score email attack vulnerability and email trust by industry. …

Microsoft shows cloud computing security benefits

Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …

IT candidates should shift career perspectives

Recruiting in the technology sector is strong, despite weaknesses and structural changes the economy has experienced over the past several years. Enterprises seem to be …

Americans are less concerned about security

Americans are less concerned about nearly all aspects of security than they were 12 months ago, but an overwhelming majority consider security issues very important when …

Do mobile devices in the workplace create security problems?

The role of IT managers has changed drastically in a short period of time – revolutionized by smart mobile devices and increased remote connection tools. While end users …

Phishing impersonating email service providers spikes

Phishing attacks impersonating email service providers increased 333 percent from Q4 2011 to Q1 2012. IID attributes this spike to spammers needing unsullied email addresses …

Cisco explores the state of cloud networking

As the role of cloud computing is growing significantly in its ability to deliver business applications, many IT decision makers are facing challenges with their existing …

Cybercriminals are exploiting users of social networking sites

In April, cybercriminals were seen exploiting users of major social networking sites in order to spread malware and spam surveys, according to GFI Software. “In the same …

The personal cloud will eclipse the PC

The personal cloud is poised to eclipse the PC as the hub of consumers’ digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools