Industry Insight News, Articles and Updates

Recycled hard drives rich with residual data, study

Recycled hard drives rich with residual data, study

By

The amount of digital information stored on recycled devices is staggering, a new study found.

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

By

London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?

Severe flaws detected in popular compression library

Severe flaws detected in popular compression library

By

Patches have been made available for programming errors found in libarchive that could make software used in a number of platforms vulnerable to exploitation.

Twitter, HealthCare.gov top annual list of most trustworthy websites

Twitter, HealthCare.gov top annual list of most trustworthy websites

By

At one time ridiculed over lax cybersecurity, the federal health insurance exchange site HealthCare.gov scored second-highest out of approximately 1,000 websites in the Online Trust Alliance's eighth annual Trust Audit and Honor Roll.

Risk-based approach essential to realistic, manageable IT security program

Risk-based approach essential to realistic, manageable IT security program

By

Security and risk are often mentioned in the same breath, and while they can complement each other, taking a risk-based approach is essential to building a realistic and manageable IT security program.

Which IT jobs are most in demand by CISOs?

Which IT jobs are most in demand by CISOs?

By

When it comes to the most in demand positions in IT among CISOs David Foote, CEO of IT market intelligence firm Foote Partners, said it's internal IT "marketers" who can successfully communicate complex cybersecurity concepts to C-level executives.

Top to bottom assurance

Top to bottom assurance

By

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.

Options surety: Case study

Options surety: Case study

By

The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.

Workplace security awareness programs lacking in efficacy, says study

Workplace security awareness programs lacking in efficacy, says study

By

Just because a company offers a cybersecurity training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a report from Experian and Ponemon Institute.

Microsoft bans passwords from breach lists

Microsoft bans passwords from breach lists

By

On the heels of a breach last week at LinkedIn that exposed passwords of 117 million users, Microsoft has put in place new password security for users of its Azure Active Directory.

Wekby hacker gang using DNS requests in new malware campaign

Wekby hacker gang using DNS requests in new malware campaign

By

A long-time hacker group is using DNS requests as a command-and-control mechanism in a new series of malware attacks.

Study: Federal agencies still lack strong cyber hygiene practices

Study: Federal agencies still lack strong cyber hygiene practices

By

A new study showing how federal agencies still don't have a firm grasp of cybersecurity practices was ironically released just days after the third-party contractor hired to fortify the U.S. Office of Personnel Management's systems suddenly quit.

Adobe patches Connect untrusted search path vulnerability

Adobe patches Connect untrusted search path vulnerability

By

A security update for Adobe Connect for Windows released Monday resolves an untrusted search path vulnerability in the add-in installer for Connect versions 9.5.2 and earlier.

Destroy your data responsibly! International Recycling Day is 17 May

Destroy your data responsibly! International Recycling Day is 17 May

International Recycling Day is held today, 17 May to caution businesses that being green and responsible recycling is vital to destroy data on disused devices

IT pros in financial services assert ability to detect breaches

IT pros in financial services assert ability to detect breaches

Data breaches in the worlds of banking, credit and finance have nearly double between 2014 and 2015 according to the Identity Theft Resource Centre's 2015 Breach List report. Despite being unsure of how long it would take, IT pros in financial services are very confident in their ability to detect a breach.

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

By

Yahoo has released its second wave of Foreign Intelligence Surveillance Court (FISC) documents concerning a 2007 case over user data.

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

By

Appthority's Q2 2016 Enterprise Mobile Threat Report found Apple and Android should better vet their app stores.

Microsoft report: 9.4 percent increase in vulnerability disclosures

Microsoft report: 9.4 percent increase in vulnerability disclosures

By

Microsoft noted a 9.4 percent increase in vulnerability disclosures to just above 3,300 disclosures in its latest study.

Researchers discover ICS attack method that spreads through networks

Researchers discover ICS attack method that spreads through networks

By

A team of researchers discover a new method of launching attacks that would threaten global critical infrastructure and utility providers through a worm that spreads through utility networks.

Study: 17 percent of IT pros confident they can defeat cyberattacks

Study: 17 percent of IT pros confident they can defeat cyberattacks

By

A recent study found that only 17 percent of IT professionals were confident in their ability to defeat cyberattacks.

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

By

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.

Where are all the security pros?

Where are all the security pros?

By

IT security is finally becoming a priority - not only for IT professionals in every industry, but also for the C-suite, says Marcin Kleczynski, CEO, Malwarebytes.

Who owns information security risk in your organization?

Who owns information security risk in your organization?

Security is a business risk that needs to be understood and owned by your business leaders, says Jeff Brown, former technology risk officer, AIG.

Hot or not, this industry is still growing up

By

Even with all the hoopla, there are CISOs still having challenges, vendors that aren't meeting needs, and companies still giving security short shrift, says Illena Armstrong, VP editorial, SC Magazine.

Educating boards

Educating boards

By

C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.

DDoS attacks still growing...and stronger, Kaspersky

DDoS attacks still growing...and stronger, Kaspersky

By

Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

By

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

Cyberattacks increase against manufacturing, healthcare industries

Cyberattacks increase against manufacturing, healthcare industries

By

Report examines the shifting direction of cyberattacks noted attackers turning their attention away from financial services, in favor of attacks against manufacturing and healthcare companies.

Most orgs couldn't quickly detect breach, study

Most orgs couldn't quickly detect breach, study

By

Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US