Just 32 percent of U.S. IT and IT security practitioners said their company has a policy that addresses the acceptable use of social media by employees in the workplace.
Cybercriminals are partnering with malicious insiders, according to a report from Verizon Business and the U.S. Secret Service.
Board members and senior management are exercising less IT security governance, and the economic downturn may be to blame, according to a survey released by Carnegie Mellon University.
A report issued this week found that 10 percent of all credit and debit card fraud victims had cash withdrawn from their accounts via ATM transactions.
A new Ponemon Institute study found that the number of data breaches caused by malicious attacks and botnets doubled last year, compared to 2008.
Sixty-five percent of American respondents said they were "seriously concerned" about unauthorized access or misuse of their personal information, while 47 percent felt the same about H1N1.
Sixty percent of IT security professionals polled in a recent study said their organization does not have sufficient resources to become PCI compliant.
Throughout 2008, phishing attacks were present in 0.5 percent of all spam, but during the first half of 2009 they dropped to 0.1 percent, according to IBM's mid-year security report.
Most consumers rarely or never change their social networking passwords or adjust privacy settings, according to a study released Wednesday by the CMO Council and security vendor AVG. The survey of 250 consumers also found that a majority of respondents let others access social networks on their machines. In addition, 26 percent share files within social networks and 21 percent accept friend requests from strangers, the survey found. — AM
Eighty percent of organizations use real data during application testing and development, but most are not confident about their ability to protect it, according to a survey released Tuesday.
Social networking sites, such as Twitter and Facebook are the most commonly attacked websites, replacing government websites as the targets of choice.
Though 83 percent of small businesses are familiar with the PCI DSS, just 62 are compliant, according to a recent survey.
Due to strained budgets, some IT departments are cutting funding for technologies that would help mitigate threats they are most concerned about, according to a survey from RSA Conference, released Wednesday.
Most health care organizations do not have data loss prevention technologies or a CISO, while, for many, tight security budgets and required third-party interactions pose additional challenges, according to a new study by Deloitte.
Approximately 23,500 infected webpages are discovered every day -- that's a new one every 3.6 seconds, according to Sophos' recently released July security threat report.
Fueled by its high rates of broadband connectivity, the United States sends out more spam than any other country in the world, according to a new report.
Cybercriminals are combining older exploits with modern business management techniques to make money, according to a new Cisco security report released this week.
One in six consumers has responded to a message they suspected was spam, according to a survey released on Thursday by the nonprofit Messaging Anti-Abuse Working Group. Of the consumers who responded to spam, most did so by mistake, but 12 percent were interested in buying the product offered, and six percent just "wanted to see what would happen." In addition, nearly 80 percent of respondents doubted their computer was ever at risk of becoming part of a botnet. — AM
CEOs often have a rosier view of data protection in their organization than other executives, according to a study released Wednesday by the Ponemon Institute and security vendor Ounce Labs.
Information security presents a unique set of challenges, but it also can enable business, a new Microsoft survey says.
Eighty percent of CISOs believe their company's own employees and contractors are the greatest threat to company data, according to a new study.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure