Cyber criminals targeting the gaming industry at an alarming rate
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Canalys’ top picks for Cybersecurity Leadership Matrix 2019
Untagged data a major risk to businesses - Veritas
Credentials install base set to hit 11 billion by 2023
Exclusive: Veeam’s business development VP looks ahead
Sophos acquires Rook Security to provide managed detection and response
Forrester names Proofpoint leader in enterprise email security
SailPoint launches AI-powered cloud identity platform
SailPoint Predictive Identity is built on big data and machine learning (ML) technology which enables an AI-driven approach to identity governance.
Opportunity growing in cyber-physical system market
The market for systems that monitor and control mechanical devices will more than double in the next 10 years with security a priority.
RapidFire Tools helps MSPs and SMBs navigate cybersecurity liability
Many cyber insurance policies require businesses to adhere to specific conditions in order to be paid out if a claim is filed.
University of Waikato's Cyber Challenge kicks off
"There is a definite shortage of cyber security professionals in the industry and through the cyber security challenge, we hope to create a more aware and cyber-ready generation in the face of the growing cyber security threats."
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
Insight Partners snatches up Recorded Future for $780m
“This transaction is the logical next step for Recorded Future given the opportunities in front of us, as we fully realize the potential and vision of our strategy."
Cloud-based ID card issuance will reinvent government processes
HID Global meets the most demanding requirements for security, quality, and effective program execution in today’s most complex ID programs.
Osterman: Running security awareness training that counts
Fundamentally, you want employees to be more informed about threats and more sceptical about what emails they receive.
Huawei calls on the US to adjust its approach to cybersecurity
"There is no gun, no smoke. Only speculation.”
Experts comment on US Customs data breach
The United States Customs and Border Protection agency has been responsible for the leaking of tens of thousands of images of travellers and license plates.
Case study: City University ups ransomware defences after attack
After recovering from this ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
NordVPN: Are kids’ smart toys spying on you?
Any internet-connected toys that have cameras, microphones, or location tracking may put children’s or parents’ privacy and safety at risk.
Is it possible to enjoy container agility and be secure?
In line with ever-changing demands on IT, containers are exploding in popularity and look set to become the preferred method for deploying applications.
Users’ names and email addresses leaked in Flipboard data breach
“An unauthorised person accessed and potentially obtained copies of certain databases containing Flipboard user information between June 2, 2018 and March 23, 2019 and between April 21 to 22, 2019.”
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
NordVPN announces new file encryption tool
NordLocker will be a file encryption app for macOS and Windows that will encrypt files stored on a computer or in the cloud.
App chat – it’s time to talk to employees about workplace tools and apps
One minute the workforce has a structured list of approved business applications and then the next minute, there are 30 different unknown products and tools being used.
How to avoid common mistakes when moving to the cloud
There is an opportunity to embrace both IT-led and user-led cloud services, but it’s important to do it safely.
Practical steps to selling cloud security-as-a-service
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world.
HP study illuminates booming counterfeit print supply industry
Businesses that purchase print supplies are in danger of falling victim to the multi-billion dollar industry of counterfeits and fakes.
Whitepaper: Are you getting your money’s worth from your SIEM?
Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems.
Researchers create AI-enabled computer keyboard malware
Researchers at Israel’s Ben-Gurion University of the Negev have created a proof-of-concept attack that can mimic the way people write via their computer keyboards.
Digital transformation: Security on the edge
Multi-cloud access, SD-WAN, AI, and IoT, combined with the ubiquity of remote and mobile users, are significantly expanding the attack surface.
NEC named Frost & Sullivan Biometrics Company of the Year
The award recognises NEC's foresight in innovating and developing biometric solutions for the future that maximises customer value and experience.
Whitepaper: Three keys to understanding the SaaS security landscape
Organisations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.