How Can Financial Services Stem the Tide of Mobile Phishing Attacks? (Security Intelligence)

According to Forgerock, the financial services industry suffered $6.2B in damage from cyberattacks in Q1 2019, up from $8 million in Q1 2018 — a 77,400 percent increase. Cybercri... More

IBM Security Study: Taxpayers Oppose Local Governments Paying Hackers in Ransomware Attacks (HITS)

IBM Security announced results of a new study that explores taxpayers' point-of-view on ransomware in the wake of growing attacks against cities. The survey highlights that nearly ... More

Google Open-Sources its Privacy Protection Tools (IT Pro Portal)

Google has announced the open-source release of some of its top privacy protection systems. The release of the company's differential privacy library will help organisations of all... More

GDPR and the Cloud (IT Pro)

A year after its first implementation, the General Data Protection Regulation (GDPR) has sent business scrambling to become compliant at the risk of receiving one of the crippling ... More

Will Quantum Computing Revolutionize Cybersecurity? IBM Thinks So (Gigabit)

IBM will begin to provide “quantum-safe cryptography services” on the IBM public cloud in 2020 and is now offering a Quantum Risk Assessment from IBM Security to help customers... More

4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)

Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More

Simulation Software: Protecting Your Organization During a Sustained Period of Cyber War (IA)

Organisations and consumers alike are in real threat of falling victim to the ongoing cyber war. Is simulated software a reasonable tactical response?... More

Box Shield Debuts With Increased Security Controls, Threat Protection (TechCrunch)

Box has always had to balance the idea of sharing content broadly while protecting it as it moved through the world, but the more you share, the more likely something can go wrong,... More

5G Technology is Coming, But Is It Already Filled With Security Flaws? (Security Intelligence)

5G technology is almost ready to take off in the U.S. While the upgrade was set to go live in 2020, some major cities have, or will soon have, access to the faster wireless speeds ... More

Industrial Cyberattacks See Huge Rise (IT Pro Portal)

Nowadays, hackers are more interested in wreaking havoc, rather than just creating malware that’s going to steal data or conduct some form of espionage. This is according to IBM... More

The Secret to a Secure Multicloud Enterprise is Open Source (Security Intelligence)

Innovation is one of the better-known benefits of crowd-contributed code — or open source — but what about security? Can open source improve or enhance your security posture? O... More

Apple Confirms $1M Reward for Anyone Who Can Hack an iPhone (Forbes)

Apple has massively increased the amount it’s offering hackers for finding vulnerabilities in iPhones and Macs, up to $1 million. It’s by far the highest bug bounty on offer fr... More

Why Mission-Critical Encryption Remains a Must for IT Security (TechGenix)

There are plenty of IT security processes, procedures, and technologies that one could use to protect mission-critical technology and data. Nevertheless, of all the tools at an org... More

Is More Talent Really the Answer to All Cybersecurity Concerns? (TechWire Asia)

Companies struggling with cybersecurity seem to believe that their biggest challenge is that they don’t have access to the right talent. That’s not true. Time and time again, r... More

15 Mind Blowing Stats for IT Leaders (CMO)

Long gone are the days of IT leaders being just the stewards of their organizations’ technology. While IT teams still spend much of their time keeping current functions and proce... More

Poor Password Management is Hurting Businesses Hard (IT Pro Portal)

Every year, businesses in the United Kingdom spend more than two months resetting different passwords, which costs them not just valuable time, but also – money. A new report sta... More

Take a Proactive Approach to the Darknet Threat (Security Intelligence)

Over the last few years, there has been a 20 percent increase of threat actors on the darknet selling tools, services and stolen data to target the world’s most prominent organiz... More

Software Developers Face Secure Coding Challenges (IW)

More organizations are adopting agile programming practices and secure development lifecycles, but most fail to provide developers the tools and processes they need to produce secu... More

Instant Messaging Platforms are Here to Stay But are They Secure Enough? (IA)

Instant messaging platforms have revolutionized the way we communicate but they've introduced new security challenges.... More

Emerging Digital Technology Means Emerging Job Opportunities for Cybersecurity Pros (DXC Technology Blog)

Every technology must be managed and secured to prevent its misuse. As digital technologies become even more complex and interconnected, they create an ever-proliferating number of... More