Ilia Kolochenko, CEO of High-Tech Bridge, discusses how any website, even a personal blog, can be sold on the black market.
Browsing: Malware and Vulnerabilities
Intralinks recently published new research with the Ponemon Institute into the security threats and data loss caused by unsanctioned file sharing.
Phil Beckett, partner at Proven Legal Technologies, considers the rise in cyber security threats and what firms must do to protect themselves.
Before migrating a database to the cloud, it is critical to understand the scope of this action, including what data should be moved where.
AlienVault Labs has been tracking a cyber espionage group from Russia for years. Here’s what we know about it.
According to a survey carried out jointly by B2B International and Kaspersky Lab, 13 percent of Internet users do not believe that cyber threats are real.
Incapsula has released a new playbook that teaches you how to prepare for a DDoS attack, what to do if one hits, and how to ultimately respond to it.
A new survey reveals 78 percent of IT security professionals are confident that firewalls and anti-malware tools are robust enough to combat today’s APTs.
According to a global survey of IT pros, 27 percent of all businesses have lost sensitive business data due to internal IT threats in the past year.
If web application security is hard, then we must find ways to be practical in our approach.