Motivations, trends and measurement of IT security spending
A new comparative survey by The Ponemon Institute explores the motivations behind IT security spending among UK and US organizations, and how industry regulations, data breach …
IT security implications of key technology trends for 2013
Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting. Their latest …
Most security pros want more desktop privilege control
While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …
Researchers uncover Tor-powered Skynet botnet
Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet – dubbed Skynet by the …
Exploit tool hitting Joomla and WordPress sites
Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …
Facebook changes privacy policies, scraps user voting
The voting period for the proposed changes to Facebook’s Statement of Rights and Responsibilities and Data Use Policy has ended on Monday, and despite the email sent out …
Custom-made malware is infecting POS terminals
A new type of malware aimed at Point-of-Sale (POS) systems has been spotted on machines belonging to big-name retailers, hotels, restaurants, and parking providers located …
Key trends in financial crime, risk and compliance for 2013
Investment in managing financial crime and compliance remains a high priority, with a significant uptick in planned expenditure for 2013, according to Detica NetReveal. Fraud …
Facebook helps Feds take down international cybercrime ring
The Department of Justice and the FBI announced the arrests of 10 individuals from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the United Kingdom, and the …
Increasing cloud adoption puts enterprises at risk
Enterprises are running one-third of their mission-critical applications in the cloud today and expect to have half of all critical applications running in the cloud by 2015, …
Not all security devices are created equal
Independent test lab Broadband-Testing released a report on its performance validation of IT network firewall solutions from Cisco Systems, NetPilot, SonicWall and WatchGuard. …
Cyberwarfare and the developing digital arms race
According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)