Instead of spending on penetration testing, IT security teams should invest in identifying the malware that’s already made its way into their system.
Browsing: Malware and Vulnerabilities
Trey Ford of Rapid7 comments on the recent Verizon email vulnerability disclosed by Randy Westergren.
Amrit Williams of CloudPassage discusses what lessons the U.S. CENTCOM Twitter hack should teach organizations.
Checkmarx explains how the Game of Hacks bridges the gap between app developers’ coding abilities and their security literacy.
32 percent of respondents who share an Internet-enabled device do not take any precautions to protect their data, says Kaspersky Lab.
techUK and Home Office identify the top 10 online vulnerabilities for 2014.
Research by Wombat Security Technologies and the Aberdeen Group shows that organizations can reduce the risk of a breach by implementing security education.
A new report from the Ponemon Institute reveals that enterprises spend $1.3 million a year dealing with false positive cyber security alerts.
Cytegic discusses how if companies today perform a ‘provocative’ action, they might face a cyber-reaction from hackers and specifically hacktivists.
An infographic demonstrates how a number of different web browsers compare in terms of security.