Cybersecurity market slowdown? Not anytime soon

A recent story on CSO highlights the disparity between “information security” (a.k.a. IT security) and “cybersecurity” — namely total spending and market growth. Gartner, the leading IT analyst firm, puts the global “information security” market at $86.4 billion in 2017 and growing by 7 percent to $93 billion in 2018. The Gartner figures, a subset of “cybersecurity,” […]

8 Steps for Building an IT Security Career Path Program

Cybersecurity professionals are in steep demand, given the projected shortfall of 1.8 million workers by 2022. But organizations can both retain their coveted cybersecurity team members so they don’t get hired away, as well as attract new talent amid competing job offers – by creating a career path program. A majority of companies don’t provide such a […]

Researchers’ tool uncovers website breaches

Researchers from the University of California San Diego (UCSD) designed a prototype system to determine if websites were hacked. They conducted their study and monitored over 2,300 sites from January 2015 to February 2017. In the end, the system detected 1 percent, or 19 sites, were compromised, “including what appears to be a plaintext password […]

5 mobile security threats you should take seriously in 2018

Mobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. The stakes, suffice it to say, are higher than ever: The […]

Only 5% of Business Leaders Rethought Security After Equifax

One-third of business leaders have heard about the WannaCry ransomware attack. Less than 5% say the Equifax breach prompted them to rethink their business’ approach to cybersecurity. Both findings, released by Veracode today, indicate a troubling lack of awareness and understanding around major breaches and common security problems. Read more about the Veracode research on DarkReading.

How CSOs Can Adapt to the Changing World of Digital Risk

Picture this, a large organization has been hacked, compromising the financial information of millions of people. News headlines detailing similar stories are now frequent, causing the job description of CSO to rapidly expand. In the past, the main responsibility of this role has been managing the physical security of an enterprise. But in today’s dominantly […]

Android vulnerability allows attackers to modify apps without affecting their signatures

Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The vulnerability (CVE-2017-13156) can be exploited to replace any kind of app, even a system app, without the user noticing anything or Android preventing the installation. Read more about the Android vulnerability on Help Net […]

These five programming languages have flaws that expose apps to attack

Even software that has been built with secure development procedures may still be vulnerable to attack, due to flaws in the interpreted programming languages they depend on. IOActive researcher Fernando Arnaboldi revealed at last week’s Black Hat Europe conference that serious flaws in interpreters for five popular programming languages put applications parsed by them at […]

5 Reasons the Cybersecurity Labor Shortfall Won’t End Soon

Cybersecurity Ventures predicts there will be 3.5 million unfilled jobs by 2021, up from 1 million at the end of 2013. With a growing awareness of the cybersecurity workforce shortage, why is the problem getting worse each year? Read about the 5 main reasons why the cybersecurity labor shortfall won’t end soon according to Steve Morgan, the founder and […]

Mobile Christmas Shopping: Beware Of Fake Apps & Data Theft

With Christmas just around the corner and shops ringing in the high revenue-generating Christmas sales, it is not only retailers who are looking forward to the start of the shopping season. Cyber criminals, for whom the increasing proliferation of mobile shopping apps is opening up lucrative attack opportunities, are also likely to profit from this […]