27001 Academy has created an infographic showing the state of data breaches in 2014.
Browsing: Breaches
AVG spoke with more than 1500 small businesses and asked them what they thought of the Internet of Things in respect of their readiness and plans to invest.
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
ESET researchers have uncovered a piece of malware that has been building a botnet in order to target Polish consulates in Belarus.
The Cybereason Research Lab found that commonly used traditional Microsoft monitoring tools miss common attacker behavior such as privilege escalation.
Organisations that are unprepared for the new EU data protection laws could be missing out on a significant competitive advantage, says Iron Mountain.
Sandeep Kumar of ForeScout discusses how implementing a next-gen network security solution capable of continuous monitoring can help prevent a breach.
Richard Pharro of APM Group weighs in on findings that many of the data breaches of 2014 were caused by internal intrusions or employee “human error”.
Brian A. McHenry of F5 Networks discusses how security is beginning to match availability and performance when it comes to application delivery.