Cybercrime trends and financial services

The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. By Doros Hadjizenonos, regional sales...

Create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By Simeon Tassev, MD and...

Gemalto simplifies IoT connectivity

Gemalto is helping simplify and secure IoT connectivity for AT&T customers by integrating its embedded SIM (eSIM) inside the Cinterion LTE-M IoT module. The new solution streamlines development for OEMs and reduces the cost and complexity of IoT deployment by...

Are we prepared for 2019’s cyber security challenges?

"Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other," wrote novelist and scientist CP Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use introduces new...

Check Point named IDC MarketScape leader

Check Point Software Technologies has been named as leader in the IDC MarketScape: Worldwide Mobile Threat Management Software 2018-2019 Vendor Assessment. It is the second-consecutive year Check Point was named a leader in this category with its SandBlast Mobile...

read more

The state of cybersecurity

On 30 November 1988 the Association for Computing Machinery (ACM) championed Computer Security Day. Since then technology breakthroughs have revolutionised the way we do business and communicate across borders. With these technology developments, new threats have...

read more