Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Browsing: Breaches
Rick Delgado weighs in on what priorities IT security teams will focus on in 2015.
27001 Academy has created an infographic showing the state of data breaches in 2014.
AVG spoke with more than 1500 small businesses and asked them what they thought of the Internet of Things in respect of their readiness and plans to invest.
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
ESET researchers have uncovered a piece of malware that has been building a botnet in order to target Polish consulates in Belarus.
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
Organisations that are unprepared for the new EU data protection laws could be missing out on a significant competitive advantage, says Iron Mountain.
Sandeep Kumar of ForeScout discusses how implementing a next-gen network security solution capable of continuous monitoring can help prevent a breach.