subscribe: Daily Newsletter

 

Mobile network security calls for new...

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which...

posted on: Sep 20, 2017 | author: Allan Davison

Mobile devices: even attacks are gett...

When it comes to mobile devices, things are getting more personal, including attacks. Contact lists, emails and text...

posted on: Sep 18, 2017 | author: Allan Davison

How to plan for a cybercrime attack

Cyber-crime is on the rise, and given the growing use of technology and the growing volumes of data organisations and...

posted on: Sep 14, 2017 | author: Allan Davison

Credit card fraud exposes need for al...

A study released in December 2016 estimated it takes around six seconds to hack a credit or debit card. That means...

posted on: Sep 13, 2017 | author: Allan Davison

Why hire people to breach your networ...

As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across...

posted on: Sep 12, 2017 | author: Allan Davison

Next generation of Kaspersky Private ...

Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky...

posted on: Sep 11, 2017 | author: Allan Davison

Shadow IT could be why businesses ...

There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice...

posted on: Sep 11, 2017 | author: Allan Davison

Migrating to a digitised environment?

Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a...

posted on: Sep 7, 2017 | author: Allan Davison

Securing customer communication is be...

Every day, several times a day, customers trust businesses with their personal information. A single transaction can...

posted on: Sep 5, 2017 | author: Allan Davison

Cybersecurity and the future model

Industry leaders presented a wide range of topics and case studies at the Cyber Security in Banking Conference...

posted on: Sep 5, 2017 | author: Allan Davison

Mission-critical myths about DDoS att...

Bryan Hamman, Arbor Network’s territory manager for sub-Saharan Africa, examines whether these...

posted on: Sep 4, 2017 | author: Allan Davison

Mobile users are in denial …

Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad...

posted on: Sep 1, 2017 | author: Allan Davison

« Previous Entries