
Public cloud services spending to reach $122.5 billion in 2017
Worldwide spending on public cloud services and infrastructure will reach $122.5 billion in 2017, an increase of 24.4% over 2016. Over the 2015-2020 forecast period, overall …

How IDF soldiers’ phones got turned into spying devices
For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …

The dangers that come with buying pre-owned IoT devices
When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you …

25% of healthcare organizations using public cloud do not encrypt data
A HyTrust survey of 51 healthcare and biotech organizations found that 25 percent of those organizations using the public cloud do not encrypt their data. The survey also …

CompTIA Cybersecurity Analyst certification to include behavioral analytics
CompTIA unveiled a vendor-neutral certification, CompTIA Cybersecurity Analyst (CSA+), that brings behavioral analytics to the forefront of assessing cyber threats. The …

Week in review: Self-healing malware, Patch Tuesday postponed, RSA Conference 2017
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2017 coverage Check out what you missed at the infosec event of the …

Magento-based online shops hit with self-healing malware
Administrators of e-commerce sites running on the open source platform Magento would do well to check their database for triggers with suspicious SQL code, warns Willem de …

AI SaaS application for cyber attack detection
PatternEx announced the first Artificial Intelligence SaaS application for cyber attack detection at RSA Conference 2017. PatternEx’s flagship product, the PatternEx Threat …

Half of IT pros lack confidence in their company’s cybersecurity strategies
Centrify asked IT professionals attending RSA Conference 2017 how their companies secure applications and infrastructure in the age of access, and their responses revealed …

Insecure car-controlling Android apps are a boon for car thieves
Being an expensive thing, a car requires an approach to security that is no less meticulous than that of a bank account. Yet, car manufacturers are infinitely more interested …

Data breaches becoming more complex, pervasive and damaging
Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves …

Global geopolitical changes driving encryption adoption
Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to …