SAP security vulnerabilities, metrics and threats
A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …
IT leaders want greater insight
Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …
BYOD influences enterprise mobile security
The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile …
CEOs lack visibility into seriousness of security threats
CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …
Insider threat as prime security concern
Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …
Growing security demands, old security infrastructure
SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …
The rise of the private cloud
More than half of North American cloud service providers (CSPs) reported that their customers are opting for the private cloud services model, while 32 percent are choosing …
Small businesses not afraid of data breaches
As the number of data breaches involving smaller businesses continues to grow, a new survey by The Hartford finds that 85 percent of small business owners believe a data …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
The rise of Tumblr and Google Play spam campaigns
In May, GFI threat researchers observed a number of attacks focused on Tumblr users including two spam campaigns centred around a fake “Tumblr Dating Game” which …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Gaps in anti-bribery compliance at multinational corporations
Despite a steady increase in Foreign Corrupt Practices Act (FCPA) investigations and enforcements over the last several years, the majority of corporate compliance officers at …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)