Network Security 

68 Percent of Employees Expose Critical Corporate Data by Mistake

That's happening even though 65 percent say it's their responsibility to protect that data.

IT Pros Report Surge in Concern About Ransomware

73 percent of respondents to a recent survey said they're very or extremely concerned about the impact of ransomware, up from 48 percent in January.

73 Percent of IT Staff Currently Have Unresolved Network Events

Forty-five percent of IT staff say they monitor network and application performance manually instead of using network monitoring tools.

LastPass Acknowledges Two Security Flaws

Researchers at UC Berkeley alerted the company to the flaws, and also found vulnerabilities in three competing solutions.

How to Reduce Use-After-Free Memory Risk

Use-after-free memory errors often crop up in software application code.

67 Percent of Critical Infrastructure Providers Were Breached Last Year

Still, only 28 percent say security is one of their organization's top five strategic priorities.

Laptop Thefts Expose Personal, Medical, Financial Data

A brokerage firm, a health district, a retirement community, a hospital and an oil change franchisee were all recently hit.

HotelHippo Shuts Down In Response to Vulnerability Disclosure

Site owner HotelStayUK says the security flaws were 'obviously completely unacceptable.'

Physical Location of Data Will Be Irrelevant By 2020

'The future will be hybrid,' says Gartner research vice president Carsten Casper.

Fighting Advanced Persistent Threats with Emulation

A layered approach to security is the key to fighting advanced persistent threats (APTs).

Tutanota Encrypted Email Service Launches

'Email encryption is the best tool to stop mass surveillance on the Internet,' says company co-founder Matthias Pfau.

Most IT Pros Don't Know Where All Corporate Data Resides

Just 16 percent of IT and IT security professionals know the location of all of their sensitive structured data.

Dragonfly Cyber Attacks Breach Western Energy Companies

Symantec researchers say the campaign 'bears the hallmarks of a state-sponsored operation.'

163,000 Affected by Butler University Data Breach

Names, birthdates, Social Security numbers and bank account information may have been accessed.

Identity and Access Management's Role in Secure Cloud Collaboration

As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.

World Cup Security Team Accidentally Reveals Wi-Fi Password

A photo published in a Brazilian newspaper clearly showed the network's SSID and password.

File Sharing Apps Pose a Significant Data Breach Threat

Forty-six percent of senior IT pros say data is leaking from their companies due to the use of file sharing services.

Security Compliance Primer and Buying Guide

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

IT Managers Are Overconfident About Insider Breaches

While 63 percent think it's easy to govern access rights, 42 percent admit they aren't able to monitor or prevent insider breaches.

Startup Spotlight: FortyCloud's Multi-layered Cloud Security

Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.

Code Spaces Destroyed by Cyber Attack

A hacker deleted most of the company's data, backups, machine configurations and offsite backups.

5 Free Tools for Compliance Management

Most IT pros consider compliance a hassle. Yet the tools of compliance can empower security technologies and simplify risk management. Better yet, some of those tools are free.

Bromium CTO Explains Promise of Secure by Design

Simon Crosby, Co-founder and CTO of Bromium, details his company's progress to deliver a Byzantine Fault Tolerant security solution

Email Breaches Expose Over 37,000 People's Data at California Colleges

Names, Social Security numbers and birthdates were exposed, along with a variety of other information.

Hackers Using DDoS to Distract Infosec Staff

Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.