Feb 4, 2016
Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today’s complex networks. It is every CISO’s worst nightmare – the phone call in the middle of the night to say that a security breach has...
Feb 2, 2016
With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...
Feb 2, 2016
Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...
Feb 1, 2016
The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground. By Michael Xie, founder, president and...
Jan 27, 2016
Mobile malware is on the increase and the purpose of almost all of it is to generate income for cybercriminals. Some malware can monitor devices for banking transactions, gathering sensitive details like passwords and account numbers. Quite common is malware that...
Jan 27, 2016
Although #Great (corporate) Wall of China never trended on underworld Twitter sites, so far as we know, there’s no real doubt that firewalls have well and truly failed as effective ways to secure corporate systems and data. The number of breaches reported daily...