Chief information officers at utilities in Western Europe identified cybersecurity as their top IT spending priority this year, according to a survey by market research firm IDC.
This year is expected to be as bad, if not worse, than last year in terms of cyberattacks. Looking into its crystal ball, IT security firm Cybernetic Global Intelligence has identified five cybersecurity trends for 2016 in this infographic.
Google announced Monday that it patched a critical vulnerability in the Android mediaserver that could enable a remote attacker to gain control of a device through email, Web browsing and multimedia messaging service when processing media files.
Mobile security threats have become more sophisticated and devastating over the past few years, while the future holds more attacks exploiting the Internet of Things and other emerging technology,
Adversaries are growing more sophisticated, making headlines with the size and scope of their attacks, and targeting new industries and vectors. As we move into the new year, Mark Painter, security evangelist at Hewlett Packard Enterprises, offers some predictions about the biggest cyberthreats and cybersecurity challenges coming in the next year.
The IoT market is moving at a fast pace, and that means vendors that are developing new products and services throughout the ecosystem are using their own security mechanisms – or in some cases none at all. The current lack of standards around security mechanisms such as authentication and communications in IoT presents its own set of challenges for security practitioners.
The state of Internet of Things security today is in its infancy, equivalent to the state of computer security in 1990, opined Chris Rouland, chairman and chief technology officer at IoT security firm Bastille.
Looks like you can add security-first to the mobile-first, cloud-first strategy that Microsoft CEO Satya Nadella is pursuing.
More than 20 percent of companies do not lock out mobile users based on number of access attempts and more than 70 percent of companies do not require two-factor authentication for mobile devices, according to a survey of 447 IT decision-makers across industries by Champion Solutions Group for cloud-based document sharing service MessageOps.
Zerodium announced that it is paying $1 million to an unidentified team for providing a remote exploit to an iPhone running iOS 9, reported ZDNet Tuesday.