Security News
![Midsized Companies, Supersized Network Security Needs (SecurityWeek)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
![US to enact sanctions against foreign cyber attackers (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
US president Barack Obama has signed on Wednesday a new executive order aimed at imposing "sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a signific...
![Review: Tresorit for Business (Help Net Security)](/static/build/img/news/alt/managed-security-small.jpg)
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps organizations with managing, pr...
![Errata Security: Pin-pointing China's attack against GitHub (Reddit)](/static/build/img/news/alt/data-breach-stats-small.jpg)
![Crypto ransomware sightings and trends for Q1 2015 (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In J...
![How vulnerable is our critical national infrastructure? (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on to connect us with our friends...
![What's complicating your security readiness? (Help Net Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that’s challenging for e...
![Don't just deploy a backup solution and hope for the best (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Employing a backup solution does not entirely eliminate data loss, according to Kroll Ontrack. The 2015 survey of customers who lost valuable computer data confirms that the majority of consumers and ...
![Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud (SANS Reading Room)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
![BH Mobile Security Summit (Dark Reading)](/static/build/img/news/alt/antivirus-stats-small.jpg)