Dubbed Heartbleed, the vulnerability compromises encryption between users and web servers using older versions of OpenSSL
Browsing: Malware and Vulnerabilities
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.
Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
54 percent of companies in the UK are using incorrect metrics when trying to determine their IT security status
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
Only 37 percent of users perform annual security assessments, and most users do not contract a third party to test their existing PACS.
On March 27, a sandboxing technology provider published a white paper regarding 11 zero-day vulnerabilities they discovered in 2013.
As the infographic shows, the explosion in the popularity of Bring Your Own Device (BYOD) can be attributed to a number of things.
Since January 2013, 48 data breaches have occurred in the education sector, including K-12 and higher education institutions
Kaspersky Lab has launched an interactive cyberthreat map that visualises cyber security incidents occurring worldwide in real time.