Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Click on a link below to find out how a layered security approach can improve and speed up your breach detection and protect your files from unauthorized access and changes.
CareFirst Blue Cross Blue Shield is the latest medical insurer to fall victim to a cyber attack. The company has issued a statement disclosing a data breach of one of its databases, which occurred in June 2014, and affects around 1.1 million CareFirst members.
The draft new Computer Science GCSE is due to be submitted for approval to Ofqual next week, with the intention of rolling out the course to secondary schools in the UK in September 2016.
C-level executives need to increase literacy in cyber security and its associated risks, a study has revealed.
More than half of CIOs in the CIO 100 said their organization had detected a cyber intrusion in the last 12 months, with a massive 95% responding security had risen up their management agenda - although not as many were seeing a corresponding increase in their budget to support this.
Institutional investors are pressing for company boards to sharpen up their cyber-security knowledge and practices, according to a new report conducted by FTI Consulting on behalf of KPMG.
In the same way that seemingly clear pond water is revealed to be teaming with life when placed under a microscope, the amount of noise created on a daily basis by critical upgrades, system patches, and required updates - once visible - can be overwhelming.
A free extension to Google Chrome that has been downloaded by 1.3 million users has been caught stealing personal information and sending it back to a single server in the US.
Linux Australia president Joshua Hesketh announced in a statement that a "malicious individual" had used a RAT to access Linux Australia's main conference database resulting in a data breach.
Two new reports chart the increasing complexity and strength of DDoS attacks, which researchers say are now used in wider, more advanced cyber-attacks.
A breach on a massive scale used to steal tens of millions of personal identification information (PII). How did it happen and what can be learned?