Infosecurity News

Security Pros: Soft Skills Like Good Communication Critical for Cyber Success

Security Pros: Soft Skills Like Good Communication Critical for Cyber Success

Organizations want non-security functions like IT operations, risk management and compliance to get more involved in cybersecurity.

GCHQ Collects Mass Social Media Data on Millions in UK—Report

GCHQ Collects Mass Social Media Data on Millions in UK—Report

The spy agency allegedly has collected info for decades, sharing it with foreign intelligence and law enforcement.

Employee Snooping is Widespread, with Most Looking for Sensitive Info They Don't Need

Employee Snooping is Widespread, with Most Looking for Sensitive Info They Don't Need

Nearly two in three IT security pros admit they've specifically sought out company information they didn’t need.

Third of IoD Members Have Never Heard of GDPR

Third of IoD Members Have Never Heard of GDPR

Institute calls on government and regulator to step up outreach efforts

ROCA Crypto Bug Compromises RSA Keys

ROCA Crypto Bug Compromises RSA Keys

Organizations urged to hunt down vulnerable Infineon chips

PwC: UK Firms in the Dark Over Cyber-Attacks

PwC: UK Firms in the Dark Over Cyber-Attacks

Latest study reveals woefully inadequate response to growing threat

Report: 88% of Java Apps Vulnerable to Attacks from Known Security Defects

Report: 88% of Java Apps Vulnerable to Attacks from Known Security Defects

New Veracode report exposes the risks companies face from vulnerable open source components

Google Rolls Out Advanced Protection for High-Risk Users

Google Rolls Out Advanced Protection for High-Risk Users

Users include journalists who need to protect the confidentiality of their sources, or people in abusive relationships.

DHS Mandates DMARC, HTTPS for All US Federal Agencies

DHS Mandates DMARC, HTTPS for All US Federal Agencies

Agencies will have 90 days to implement DMARC and 120 days to upgrade to HTTPS.

Cyber-criminals, North Korea Embrace Crypto-mining

Cyber-criminals, North Korea Embrace Crypto-mining

Long-term, low-velocity, low-risk crypto-mining operations have become a go-to approach for cyber-criminals.

Poorly Secured SSH Keys Exposing Firms to Breaches

Poorly Secured SSH Keys Exposing Firms to Breaches

Venafi finds 90% of organizations don’t even know what they have

Microsoft Kept Quiet About 2013 Bug Database Hack: Report

Microsoft Kept Quiet About 2013 Bug Database Hack: Report

Five former employees reveal lack of transparency at tech giant

What’s Hot on Infosecurity Magazine?