Consumers wise up to protecting their data

Consumers are finally beecoming aware of the value of their data, and show preference to companies that protect it.

BrtMedia video malvertising highlights industry shortcomings

Researchers at Malwarebytes spotted a video malvertising campaign that highlights the ad industry's lack of security.

Two in a thousand people 'view child sexual abuse images at work'

NetClean's CEO calls on workplaces to be on lookout for child sexual abuse imagery on work computers as the children's commissioner for England publishes her report which says only one in eight cases are reported.

FTC to appeal LabMD dismissal ruling

A little more than a week after a Federal Trade Commission administrative law judge tossed the FTC's data breach case against LabMD, the agency has filed an appeal of the ruling.

Cryptowall 4.0 spotted in nuclear exploit kit

Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.

Featured: Malware

Hilton Worldwide confirms malware on POS targeted payment card info

Thieves that planted unauthorized malware on some Hilton Worldwide point of sale (POS) systems aimed to glean payment card information in a breach that occurred late in 2014 or mid-2015, the hotel company confirmed Tuesday.

Product Reviews

Rsam GRC Platform

Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

November issue now available


Opinions The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

Opinions All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

Opinions How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Sign up to our newsletters