subscribe: Daily Newsletter

 

Data-centric security enhancements fr...

CA Technologies has launched new data protection enhancements to CA Data Content Discovery and CA Compliance Event...

posted on: May 22, 2017 | author: Allan Davison

Bytes launches home-grown biometric s...

Bytes Systems Integration has launched BioVault, an innovative cloud-based biometric solution. Nick Perkins,...

posted on: May 19, 2017 | author: Kathy Gibson

Check Point unveils WannaCry infectio...

Check Point Software Technologies shows the extent of the wide spread outbreak of international ransomware WannaCry...

posted on: May 18, 2017 | author: Kathy Gibson

40% off cross-grade B2B promotion fro...

When it comes to security, it can be hard to sift through the plethora of solutions available to find the one that...

posted on: May 17, 2017 | author: Kathy Gibson

Possible connections between WannaCry...

On Monday, 15 May, a security researcher from Google posted an artefact on Twitter potentially pointing...

posted on: May 16, 2017 | author: Kathy Gibson

Bitdefender blocks WannaCry ransomwar...

Bitdefender claims that it has blocked WannaCry from the beginning. Unlike other ransomware families, the WannaCry...

posted on: May 16, 2017 | author: Kathy Gibson

HID improves fingerprint accuracy

HID Global has enhanced its compact, cost-effective Lumidigm M-Series fingerprint solutions. Bringing the ease-of-use...

posted on: May 12, 2017 | author: Kathy Gibson

Android permission security flaw spot...

Check Point researchers have spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy...

posted on: May 11, 2017 | author: Kathy Gibson

CA payment security reduces online fr...

CA Technologies has launched its CA Risk Analytics Network, a card-issuer network that stops card-not-present fraud...

posted on: May 11, 2017 | author: Kathy Gibson

Metasys delivers new graphics, enhanc...

The new Metasys 8.1 building automation system from Johnson Controls delivers new graphics, enhanced security and...

posted on: May 8, 2017 | author: Kathy Gibson

One Channel Namibia warns of security...

Ransomware has emerged as the most serious malware threat of the 21st century, with criminals projected to extort...

posted on: May 4, 2017 | author: Allan Davison

More threats for IP access control

When it comes to security, everything has moved to IP, from access control to CCTV systems. Organisations are actively...

posted on: May 4, 2017 | author: Allan Davison

How to survive a global cyber attack

The most effective defense against the “Wanna Cry” global cyber attack is to update operating systems,...

posted on: May 22, 2017 | author: Allan Davison

WannaCry proves businesses still pain...

There is still a perception today amongst businesses and their leaders that their company’s security is good enough...

posted on: May 18, 2017 | author: Kathy Gibson

WannaCryptor: key questions answered

WannaCryptor, aka WannaCry, is one of the biggest cybersecurity stories of 2017. In fact, you could go as far as to...

posted on: May 17, 2017 | author: Kathy Gibson

WannaCry update, guidance from Micros...

Microsoft has issued the following alert to provide guidance regarding malware variously named WannaCrypt, WannaCry,...

posted on: May 16, 2017 | author: Kathy Gibson

Six steps to protect, reduce impact f...

In light of recent cyber-attacks focused on global organizations through ransomware, EY is urging organisations...

posted on: May 16, 2017 | author: Kathy Gibson

BT Security and the WannaCry attack

Mark Hughes, CEO of BT Security, tenders this statement: WannaCry brought to the front many of the issues we, security...

posted on: May 16, 2017 | author: Kathy Gibson

How to defend against WannaCry

An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The...

posted on: May 16, 2017 | author: Kathy Gibson

WannaCrypt update from Kaspersky Lab

On Friday 12 May 2017, organisations across the world were hit by a massive ransomware attack, named WannaCry, which...

posted on: May 16, 2017 | author: Kathy Gibson

Attacks highlights need for cyber ins...

The fresh ransomware attack of unprecedented proportions, estimated to have impacted at least 100 countries, and...

posted on: May 16, 2017 | author: Kathy Gibson

Insulating your business against rans...

The world has been shaken by a massive ransomware attack. Jonathan Kropf, CEO of Tarsus On Demand, offers some advice...

posted on: May 15, 2017 | author: Kathy Gibson

Tips for hybrid network-enabled secur...

The information and communications technology (ICT) sector is one of the main driving forces behind organisational...

posted on: May 9, 2017 | author: Kathy Gibson

Securing the software-defined data ce...

The term “digital transformation” is on every CIO’s lips today, and a large part of this transformation, is the...

posted on: May 8, 2017 | author: Kathy Gibson

« Previous Entries