'Visual hacking' a privacy risk to business travellers
While 8 out of 10 business travellers consider visual hacking a threat, they don’t do much about it.
Radiflow launches OT MSSP partner programme
Retailers failing customers when it comes to data security
SOC roles and responsibilities evolving with threats - Exabeam
Workplace inboxes still plagued by phishing attacks
Exclusive: Veeam’s business development VP looks ahead
Silver Peak and NSC announce global partnership
Experts comment on US Customs data breach
The United States Customs and Border Protection agency has been responsible for the leaking of tens of thousands of images of travellers and license plates.
Credentials install base set to hit 11 billion by 2023
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
NordVPN: Are kids’ smart toys spying on you?
Any internet-connected toys that have cameras, microphones, or location tracking may put children’s or parents’ privacy and safety at risk.
Case study: City University ups ransomware defences after attack
After recovering from this ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
Exclusive: Okta’s APAC GM on its expansion strategy
As APAC organisations recognise the need for identity and access management solutions, Okta finds itself attracting attention from both partners and customers.
Forrester names Proofpoint leader in enterprise email security
Email remains the preferred attack vector for cybercriminal activity, from low-level cybercriminals to nation states.
Critical lessons businesses can learn from Huawei - Memset
“Data sovereignty is important and should not just be an afterthought."
E-book: How to protect DNS servers and protocols
This brief volume serves as a primer of many of the common terms in DNS security you’ll run into, high-level descriptions of the threats you face, and practical solutions that you can implement right away.
Whitepaper: Three keys to understanding the SaaS security landscape
Organisations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.
Palo Alto Networks introduces new cloud security suite
It aims to be the new benchmark in cloud security, transforming the cloud journey by simplifying access, data protection, and application security.
NEC named Frost & Sullivan Biometrics Company of the Year
The award recognises NEC's foresight in innovating and developing biometric solutions for the future that maximises customer value and experience.
Insight Partners snatches up Recorded Future for $780m
“This transaction is the logical next step for Recorded Future given the opportunities in front of us, as we fully realize the potential and vision of our strategy."
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
Native email security systems inadequate – Mimecast
In the report, 85% of the 1,025 global respondents experienced an impersonation attack in 2018.
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
HID Global launches ID verification solution
The HID goID Simple Verifier is a small device that can be used by anyone seeking to quickly verify the age of citizens carrying a HID goID mobile ID on their smartphones.
How to avoid common mistakes when moving to the cloud
There is an opportunity to embrace both IT-led and user-led cloud services, but it’s important to do it safely.
Why one in three CEOs would fire the person responsible for a breach - Nominet
The research surveyed more than 400 C-suite executives from enterprises.
Users’ names and email addresses leaked in Flipboard data breach
“An unauthorised person accessed and potentially obtained copies of certain databases containing Flipboard user information between June 2, 2018 and March 23, 2019 and between April 21 to 22, 2019.”
Skybox Security launches update to simplify hybrid cloud risk management
Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.
Breach checking website Have I Been Pwned is up for grabs
The man behind the popular breach checking website Have I Been Pwned is stepping down from his esteemed post as sole manager of the site.
Opportunity growing in cyber-physical system market
The market for systems that monitor and control mechanical devices will more than double in the next 10 years with security a priority.
Nearly half of all employees are willing to share business secrets
Insider threat is real, according to a new report that highlights employee behaviour around sharing corporate information.
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Sophos extends endpoint detection offering to servers
By adding EDR to Intercept X for Server, IT managers can investigate cyberattacks against servers, a sought-after target due to the high value of data stored there.