Aug 31, 2016

German wire supplier Leoni loses €40m in email impersonation scam

Leoni AG, a Germany-based supplier of wires, cables and wiring systems, has fallen victim to ...

Aug 29, 2016

Technology Providers Grapple with Ongoing Threats to Data Security

Information technology companies are especially aware of the need for strong cyber security, ...

Half of companies unnecessarily grant employees more access than needed

Although insider leaks and attacks continue to multiply, recent research found 58 percent of ...

Cloud use increases attack surface up to 100-fold; companies fail to keep up with flood of threats

Companies’ attackable surface area has increased by a factor of two to 100 times as CIOs ...

Practical steps for strengthening your company's password rules

Passwords are a perennial problem. We rely so much on them to secure our company systems, ...

The dark side of the cloud: improper sharing and access, most cloud-related security incidents, study shows

With cloud adoption becoming a reality for companies, most admit having experienced cloud ...

Tor vs. I2P – Anonymization and B2B Opportunity

The internet is a far stranger place than the average user gets to experience. It’s used not ...

Aug 17, 2016

Healthcare Industry Still in Need of Cyber Security Treatment

Two recent hacker attacks show that the cyber assault against organizations in the ...

Calculating the economic impact of security incidents on critical infrastructure remains elusive

With the rise of APTs and the continued interconnection of critical infrastructure ...

Getting executive buy-in for identity management

Some enterprise technology deployments can be handled entirely by IT, don’t require ...

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

As the cloud’s popularity grows, so does the risk to sensitive data. More than half of ...

Big Black Hat 2016 Story Round-up

The hacks and vulnerabilities out of Black Hat USA are interesting every year. Last year ...

Financial Services Providers Remain a Big Target of Security Intruders

Some time ago we examined the key cyber security issues and challenges facing a number of ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW