Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
One Identity: How to mitigate the risks of spearphishing
Native email security systems inadequate – Mimecast
CyberArk opens integration ecosystem to community contributions
How to avoid common mistakes when moving to the cloud
Radiflow launches OT MSSP partner programme
Tenable's take on effective vulnerability assessment
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
HPE announces new offerings to drive intelligent edge adoption
New IoT and edge offerings and a partner program are aimed at accelerating the deployment of personalised digital experiences and smart operations.
Fortinet increases 5G security capabilities
With the increased adoption of 5G, mobile network providers will become secure business enablers.
Cyber attacks on healthcare companies growing
“The potential, real-world effect cyberattacks can have on healthcare organisations and patients is substantial.”
Meeting the card payment industry’s compliance requirements - Kemp
Combating CNP (card not present) fraud has become a key priority across the entire e-commerce community.
Researchers create AI-enabled computer keyboard malware
Researchers at Israel’s Ben-Gurion University of the Negev have created a proof-of-concept attack that can mimic the way people write via their computer keyboards.
A10 Networks extends cloud portfolio with new container-based solutions
The addition of Thunder Containers extends the company’s multi-cloud portfolio and increases the performance, security and availability of applications.
Apple gets serious about enterprise & security features
Features include new BYOD policies, managed Apple IDs, security enhancements, and even an app that allows users to find their phone or their friends.
Cryptolocker malware and ransomware threats on the rise
Cryptolocker malware and ransomware is increasing at a rapid rate, with these threats rising 167% over the previous quarter.
'Visual hacking' a privacy risk to business travellers
While 8 out of 10 business travellers consider visual hacking a threat, they don’t do much about it.
RapidFire Tools helps MSPs and SMBs navigate cybersecurity liability
Many cyber insurance policies require businesses to adhere to specific conditions in order to be paid out if a claim is filed.
Whitepaper: Key considerations to improve cost efficiency with SIEM
Frost & Sullivan Research VP Michael Suby suggests that security alerts will increase in both volume and diversity as enterprise networks and systems expand.
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
LogMeIn expands cloud identity capabilities with new offerings
Many small and medium-sized companies don’t have the resources to implement robust security programs.
Breach checking website Have I Been Pwned is up for grabs
The man behind the popular breach checking website Have I Been Pwned is stepping down from his esteemed post as sole manager of the site.
IHS names Genetec top video management vendor
IHS-reported results from 2015-2018 point to the company sustaining a 24.1% CAGR for the past 3 years in this category.
Report: The murky world of malicious AI
"Imagine getting a video call from your boss telling you she needs you to wire cash to an account for a business trip that the company will later reimburse. DeepFakes could be used in incredibly convincing spear phishing attacks."
Evaluating a SIEM’s speed and scalability
SIEMs are supposed to consume log and event information from endpoints, security devices and network flows, while providing a dashboard for analysts to drill down into events.
Forrester names Proofpoint leader in enterprise email security
Email remains the preferred attack vector for cybercriminal activity, from low-level cybercriminals to nation states.
SOC roles and responsibilities evolving with threats - Exabeam
Keeping up with security alerts presented the largest pain point experienced by SOC personnel.
Skybox Security launches update to simplify hybrid cloud risk management
Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.
Europol, FBI, Bitdefender team up on ransomware decryptor
The decryptor neutralises the latest versions of GandCrab – the most prolific families of file-encrypting malware to date.
How Infoblox bolstered City University’s network security
City University identified a need to protect its devices and sensitive data when it experienced a potentially damaging and expensive ransomware attack.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.