How Malware Bypasses Detection Tools

Posted : 03-03-2015

More than one-half of security breaches occur through companies' browsers despite malware-detection technologies, according to a new study. That means companies are spending millions without success to protect themselves, according to the Ponemon Institute, which was commissioned by Spikes Security to prepare the report,... Read More »

Mobile Fraud Expected to Explode by 2017

Posted : 02-24-2015

Over the next few years, e-commerce conducted on mobile devices and apps is expected to surpass purchases through browsers on personal computers, rendering companies that have not secured their mobile transactions vulnerable to rampant fraud. This is according to a new study by J. Gold Associates, a market research firm... Read More »

IT Leaders Aren’t Addressing Security Threats

Posted : 02-24-2015

Many security leaders believe the next three years will determine if organizations can win the cyber-war. Read More »

Security Threats Require More Action From CIOs

Posted : 02-20-2015

CIOs, CISOs and other executives need to take security a lot more seriously and turn to more advanced methods to detect potential problems. Read More »

Why Schools Fail at IT Disaster Recovery Efforts

Posted : 02-13-2015

Educational institutions lag behind commercial businesses in preparedness for major IT disasters, according to a new study. Only 26 percent of IT professionals surveyed said they feel very prepared for such an event. One-third of IT professionals said their organization suffered a major incident requiring disaster... Read More »


Thanks for your registration, follow us on our social networks to keep up-to-date