Subscribe Archives >

What Info Security Pros Think About Fake News

3 hours ago | by Eileen McCooey

Fake news sources are manipulating U.S. politics, and it's virtually impossible to stanch the flow of bogus reports. That's the opinion of most cyber-security experts and industry thought leaders who... Read More



  • The Cloud and Politics Are Growing Attack Triggers
    Dominating the cloud and the world's political discourse apparently comes with a price. As the country that serves as the predominant location of cloud-hosted infrastructure globally, the United States has also become the epicenter of cyber-crime....
  • Business Braces for More Ransomware Assaults
    Cyber-security teams need to brace themselves for more action: Ransomware attacks are likely to increase during the second half of this year, according to a recent survey conducted by ISACA (Information Systems Audit and Control Association), a...
  • Tackling Cyber-Attacks, Espionage & Cyber-Warfare
    Cyber-attacks, including cyber-espionage and cyber-warfare, have emerged as huge risks in recent years. What's more, actor groups and the methods they use have become far more aggressive and sophisticated. In addition to stealing data and...
  • Modern Cyber-Crimes and How to Avoid Them
    Hackers will continue to refine and adapt their methods to find their way around each new defense, so you must continually improve your cyber-security posture.
  • Security Operations Struggle to Cope With Attacks
    Over the last few years, cyber-attacks have steadily increased and are now far more than a value risk to the enterprise: They're an everyday threat. What's more, these attacks are becoming more dangerous and potentially more costly. The report...
  • Deep Insecurities Affect Business and Society
    The digital world creates security challenges that many (most?) business and IT leaders aren't equipped to handle—challenges that affect industry and society.
  • Report Paints Bleak Picture of Threat Landscape
    It doesn't take much research to know that 2016 was a bad year on the security front: A cursory review of the headlines tells the story. The year brought a new level of creativity and brazenness among cyber-criminals, who took things to a new level...
  • How Risky Is the Internet of Things?
    It's increasingly clear that the internet of things (IoT) presents new and sometimes remarkable opportunities. However, it also represents risks and potential security problems for organizations. "The Internet of Things (IoT): A New Era of...
  • Insider and Third-Party Access Top Cyber-Threats
    For most enterprises, it's not a question of whether they'll suffer a serious security breach, but when. A global survey by Bomgar, a provider of secure access solutions, found that security professionals recognize the threats posed by employees,...
  • University Upgrades—and Shares—Security System
    The University of Massachusetts implements a centralized network security system and offers it as a managed service to other schools and businesses.

Security Archives >

Manage your Newsletters: Login   Register My Newsletters