
Global cyber security market: Competition forecast and opportunities
Increasing cyber attacks on the critical infrastructure has rendered worldwide security at risk. The prime motive behind these attacks is to gain access to financial …

Snowden documents definitely link Shadow Brokers’ leak to the NSA
Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …

Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

Display the cryptographic signing information about any file on your Mac
Verifying a file’s cryptographic signature can help the user deduce its trustability. If you’re using OS X, there is no simple way to view a file’s signature from …

18-year-old random number generator flaw fixed in Libgcrypt, GnuPG
Researchers have discovered a “critical security problem” that affects all versions of the Libgcrypt cryptographic library and, therefore, all versions of the …

The deception technology market is exploding
The global deception technology market is expected to generate a revenue of USD 1.33 billion by 2020, according to Technavio. Deception technology was introduced as an …

Week in review: Hacking smart cities, leaked hacking tools, and detecting hardware Trojans
Here’s an overview of some of last week’s most interesting news and articles: eBook: Defending against crypto ransomware Download your copy of the Defending …

Is security enabling or compromising productivity?
While most organizations fundamentally believe connecting people to the best technology is vital to business productivity, many struggle to achieve agility due to traditional …

Researchers pinpoint best times for delivering security messages
When is the best time to deliver a security message? A group of researchers from Brigham Young University has been tracking users’ neural activity while they are using a …

Banking customers hesitant to use mobile features due to security concerns
Banking customers are hesitant to use mobile features due to fraud and security concerns, according to Kaspersky Lab and IDC Financial Insights. Their findings show that of …

The state of security? No one cares about a breach
In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …

Cloud security market in the retail sector expected to grow
The global cloud security market in the retail sector is expected to grow at a CAGR of close to 21% until 2020, according to Technavio. Cloud security is a technology designed …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy