HP extends remote PC management with HP Wolf Connect

HP Inc has announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline. Using a cellular-based network, HP Wolf Connect’s...

Humans still the number one attack vector

With insider risk on the rise and Gartner predicting that 50% of organisations will have adopted an insider risk program by 2025, J2 Software recognises that enterprise security is only achievable when the cyber strategy is underpinned by the human element. The...

Virtual burglaries to shine light on why criminals work in pairs

Immersive virtual reality (VR) technology is being used in a new study to understand how and why burglars work in pairs or groups. Students at the University of Portsmouth are being asked to become burglars for the day. Student participant pairs will be tasked with...

Fake apps on Apple’s App Store used in CryptoRom schemes

Sophos has released new findings on CryptoRom scams – elaborate financial fraud schemes that prey on and trick dating app users into making fake cryptocurrency investments – in its latest report, “Fraudulent Trading Apps Sneak into Apple and Google...

Commvault takes Kubernetes data protection honours

Research firm GigaOm has named Commvault a “Leader” and “Outperformer” in the new GigaOm Radar for Kubernetes Data Protection for the third year running. Commvault was evaluated along with 14 other vendors based on execution, roadmap, and...

Take a quantum leap in IoT cyber security

Year after year, more IoT devices are being manufactured and connected. According to a report by Meticulous Research, the IoT security market is expected to grow at a CAGR of 21,2% from 2022–2029 to reach $59,16-billion by 2029. By Fred Mitchell, software division...