Cybersecurity Market Report Looks at Global Spending on Mobile Security

The mobile security space is going to explode. According to Gartner, nearly 2.2 billion smart phones and tablets were sold to end users in 2014. “In 2014 in the US, mobile web traffic exceeded desktop web traffic for the first time as mobile has become the most convenient and cost-effective way to get online” says […]

Israeli Regulator Directs Banks to Focus on Cyber Security Management

Congratulations to David Zaken, Supervisor of Banks at the Bank of Israel, for wading in, no, for jumping in with both feet in potentially shark-infested waters of cyber regulation, with the recent issuance of “Directive 361”, Cyber-security Management, aimed at banks and credit card companies. (The original directive in Hebrew can found HERE) The purpose […]

Extending IT Security Data and Analytics Platform with Acquisition of NT Objectives

Extends IT Security Data and Analytics Platform with Acquisition

New Web Application Scanning solution now part of Rapid7 portfolio providing customers with deep analysis and security testing capabilities to manage risk across web applications and assets A leading provider of security data and analytics software and services, announced today that it has acquired NT OBJECTives (NTO), the web and mobile application security testing company, expanding […]

True Private Messaging: 7 Apps to Encrypt Your Chats

7 Apps to Encrypt Your Chats

Are your text messages and IMs safe? Given the knowledge of extensive government surveillance  programs that are continually leaked, and the massive tracking programs corporations use to keep tabs on consumers, it’s a fair question to ask. There are a number of apps that can keep personal messages private, though there are some things you […]

Browser Malware, Operational Burdens Driving Enterprises To Seek Effective Technology for Secure Web Access


In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative Nightmare Spikes Security [1], the isolation security company, today announced findings of a new survey of IT and information security professionals, commissioned by Spikes Security and conducted by The Enterprise Strategy Group, Inc. (ESG) to […]

Survey Reveals High Adoption of Office 365 and Sharepoint Online

Survey Reveals High Adoption of Office 365 and Sharepoint Online

Survey reveals that while usage is high, companies still not leveraging Office 365 for sensitive data A provider of dynamic, context-aware network, application and content security solutions, today revealed the results of a Microsoft® Office 365 and SharePoint survey conducted with TechValidate. The survey addressed how organizations are utilizing Office 365 and SharePoint, what applications they […]

Phishing in the C-Suite: 96% of Executives Vulnerable to Attacks

Phishing in the C-Suite

This problem is spreading across the organisation as 80% of users failed to detect at least one of seven phishing emails. According to a recent survey, 96% of executives failed to tell the difference between a real email and a phishing email 100% of the time. This is among one of the key findings featured […]

Linux Malware: Spam from your Servers

Spam from your servers

ESET researchers uncovered a family of Linux malware named Linux/Mumblehard that stayed under the radar for more than 5 years, targeting mainly web servers. Monitoring of the botnet suggests that the main purpose of Mumblehard seems to be to send spam messages by sheltering behind the reputation of the legitimate IP addresses of the infected […]