Posted on 18 June 2013. | Drawing on data gathered from a total of 3,037 individuals, a Ponemon Institute survey revealed a clear disconnect between these groups within UK enterprises.
Posted on 17 June 2013. | Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee.
Posted on 17 June 2013. | Many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national security agencies in order to get information about potential risks and attacks.
Posted on 13 June 2013. | OWASP has released its 2013 top 10 list of risks associated with the use of web applications in an enterprise.
Posted on 13 June 2013. | There is a saying that the power drives those holding it to want more power.
Posted on 17 June 2013. | George Baker, the Director of Information Security at Exostar, talks about the challenges in working in a dynamic threat landscape, offers tips for aspiring infosec leaders, and more.
Posted on 14 June 2013. | Over two thirds (66%) of large organizations said they either had not experienced a security incident in the last 12-18 months or were unsure if they had.
Posted on 12 June 2013. | nCircle PureCloud is a cloud-based network security scanning product built upon the companies' vulnerability and risk management system IP360.
Posted on 12 June 2013. | If you think of cyberspace as a new resource for you and your organization, it makes sense to protect your part of it as best you can. But is it a good idea?
Posted on 11 June 2013. | Read on for comments on this scandal that Help Net Security received from a variety of security professionals and analysts.