NSS Labs has announced the results of its Next Generation Firewall (NGFW) Group Test, testing 11 products from 10 market-leading vendors, in the key areas of security effectivenes... More
Something is going badly wrong with the way the mountain of big data generated by enterprise mobile apps is being stored on back-end servers, a new analysis has shown. In March,... More
UNIVERSAL CITY, Calif. — Martin Mazor, chief information security officer for Entertainment Partners, spent roughly two decades in various security roles in different industries,... More
Email attacks are cheap, easy, low risk, and high reward. No wonder a “malicious email is the cyber spy’s favored way in.” An email security breach could impact your organiza... More
Ransomware has been making big news in the last week. The cruel reality of the global ransomware attack that crippled computer systems in 150 countries is that the attackers took... More
Lately, I’ve been paying particular attention to the concept of having a cybersecurity portfolio. It’s a view that looks at the need for enterprise-grade cybersecurity from a ... More
Malware has been around for decades now. And as our reliance on computing systems has grown, so too has malware proliferation. While antivirus applications were once the key elemen... More
We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More
The scope and severity of the fallout from the WannaCry attacks elicits plenty of "we told you so" head shakes about the dangers of ransomware. With a lightning-fast speed, the bla... More
If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payme... More
Exploits, data breaches and ransomware campaigns are succeeding despite increased public awareness about these threats. New victims are found, old targets are rediscovered and peop... More
Verizon has released its 10th annual Data Breach Investigations Report (DBIR), a comprehensive and multi-faceted look-back on breach trends, threat actor tactics and apparent motiv... More
Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of t... More
More than 1,000 people are expected to attend the May 18-19 ISSA-LA Information Security Summit at the Universal City Hilton in Los Angeles, with IT and InfoSec executives, leaders... More
Ransomware is big money. In fact, according to the Federal Bureau of Investigation, ransomware attackers collected more than $209 million from victims in the first three months of ... More
NAB 2017: Watermarking, Securing Data and Protecting Broadcasts: A Preview of CDSA’s NAB Cybersecurity Program
The Content Delivery and Security Association (CDSA) kicks off its three-day “Cyber Security and Content Protection Pavilion” (C3830CS at the Las Vegas Convention Center) prog... More
How much information do you need to manage your security? Until recently, the answer was always “more.” That is changing as the sheer volume of available data grows. Today, co... More
NSS Labs has announced the results of its second Web Application Firewall (WAF) Group Test. A growing segment of the security market, WAFs employ a wide range of functions to work... More
Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it all. But many of these threats a... More
Microsoft, Box Ink Yet Another Cloud Partnership (Fortune)On Tuesday, Box named Microsoft Azure as a "strate more...
CIOs Should Step Into the IoT Oversight Void (CIO)If you think your organization is taking oversight more...
Cisco, Apple Chiefs Discuss Further Partnership Opportunities (ZDNet)Cisco and Apple are looking to expand their partne more...
AWS to Open Hong Kong Region (Datacenter Dynamics)Amazon Web Services will open a cloud region in Ho more...
The App Economy Will be Worth $6 Trillion in Five Years Thanks to Mobile Commerce (Re/code)In five years, the app economy will be worth $6.3 more...
Fox Sports Pacts With Facebook to Live-Stream European Soccer Championships (Variety)Facebook has scored more live sports for its growi more...
IBM Landed a Big Win in the Race to Sell Blockchain to Wall Street (BI)IBM has been selected to build a new blockchain-ba more...
Want to Succeed at Data-Driven Transformation? Start Slow (Information Week)Data-driven transformation efforts often fail beca more...
Why the ‘As-A-Service’ Model Works So Well for Digital Transformation (Forbes)Digital transformation has a way of changing not j more...
The Top 3 Technologies Expected to Transform Business by 2020 (Salesforce Blog)AI is now ingrained in everything we do. Any of th more...
7 Digital Trends that Will Change Business Forever (CMO)VR Now Just One Of The Gang: After the initial rus more...
Why ‘Peak TV’ is Further Away Than We Think (Fortune)How much tv is too much TV? A record 454 scripted more...