Half of companies fear own staff the most when it comes to cyber security

The survey, carried out by IT Governance, found that 54% of those interviewed believed that insiders were the biggest threat, in contrast to the 27% who believe that criminals are the greatest threat.
INFOGRAPHIC: The Future of Information Security

In 2012 we saw significant data breaches across multiple industries and governments impacting millions of users. This year seems to be bring more of the same. Is this an uncertain future we will have to live with?
Apple iCloud services offline for a few million users

Apple iCloud users have been hit by yet another outage, though this one seems to have affected a relatively small percentage of users.
How Hacktivists Have Targeted Major Media Outlets

Global conflicts have increasingly led tech-savvy protesters and loyalists to express their views online by hacking, and while many groups have focused on attempting to damage or deface government websites
Syrian Electronic Army attacks several sites for the price of one

It only took one attack last week, but it was enough to allow the Syrian Electronic Army (SEA) to compromise The Washington Post, CNN and Time.
Canada keeping ‘close eye’ on ailing BlackBerry

Canada’s Prime Minister Stephen Harper once called BlackBerry as a “crown jewel” to the country.
Bloomberg to tighten internal controls following client data breach

An external review of Bloomberg’s data policies and procedures has recommended stronger measures be put in place in order to ensure journalists are unable to view client information through its financial data terminals.
Riot Games Hacked

Gaming Companies, and especially those who provide a cloud service for either online play or account management are a great and very compelling target for attackers.
How to Build a Website Security Program

The key to improving a web security program is having a comprehensive metrics program in place – a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road.
Analysis of Poison Ivy remote access tool

A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release – attacking dozens of Fortune 1000 firms.