Sep 28, 2015
Most breaches and attacks do not happen quickly and violently. They happen stealthily over time, with threat actors lurking inside your network for months at a time, performing reconnaissance and looking for your most valuable and sensitive information. “In fact, the...
Sep 25, 2015
With the proliferation of mobile devices in the workplace, it has become critical to not only manage your mobile assets, but also protect your company’s data. The purpose of enabling a mobile workforce is to increase employee productivity and improve customer service,...
Sep 22, 2015
Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...
Sep 21, 2015
A hybrid security approach is a company’s best chance of mitigating DDoS extortion attacks, says Gad Elkin, security sales director: EMEA at F5 Networks. It is a testament to the sustained evolution of the cybersecurity landscape that we are still regularly...
Sep 18, 2015
You receive an email or text message claiming you have won a cash prize, but you don’t recall entering a competition. It says that to receive the money, you will need to share your banking details – what should you do? The answer is simple. Never provide...
Sep 18, 2015
Cyber-attacks have become a thriving and profitable industry for criminals, a fact that is evidenced by the increasing number of well publicised and high profile attacks over the past year. By Simeon Tassev, director of Galix. The majority of these attacks, which are...