Toshiba and Cisco to collaborate on new ways to utilize IoT
Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …
Secure remote file access challenges
While the majority of full-time employees access files remotely (89%), nearly three-quarters (73%) still do so via email, and less than a quarter (22%) are aware of a …
Best practices for government agencies to secure IT infrastructure
Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their …
Americans’ privacy behaviors and attitudes in the post-Snowden era
Most Americans are aware of and worried about government efforts to monitor communications and access their data but, interestingly enough, they still look to the government …
ISPs are removing encryption from customers’ emails
A number of ISPs in the US and Thailand have recently been spotted actively removing encryption from their customers’ data sent to email servers, the Electronic Frontier …
Microsoft open sources .NET server stack
Microsoft open sourced the full server-side .NET stack and expanded .NET to run on the Linux and Mac OS platforms. The company also released Visual Studio Community 2013, a …
The biggest challenges around connected devices
Few European IT departments or workplaces are ready for the invasion of wearable technology and other connected devices. According to a 110-country survey of ISACA members who …
Report: Targeted digital threats against civil society organizations
Civil society organizations (CSOs) that work to protect human rights and civil liberties around the world are being bombarded with the same persistent and disruptive targeted …
Latest Microsoft patches crucial for all Windows users
Microsoft has closed a great many flaws, including a 0-day abused by the Sandworm team, in November’s Patch Tuesday. But there is another vulnerability that you should …
SAP finally patches critical, remotely exploitable bugs in GRC solution
More than a year and a half after they have been reported to SAP AG, the company has issued a patch for a number of critical exploitable security vulnerabilities in its …
Organized cyber crooks plunder SMBs with simple, cheap keyloggers
The popularity and pervasiveness of Zeus/Zbot has made it almost a synonym for banking malware, but there are unfortunately many more types of malicious software that allow …
Do senior executives value information security?
Information security is low down on the list of risks to the business, according to NTT Com Security. The report, based on a survey of 800 senior business decision-makers (not …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)