With apologies to Troy Hunt, the last thing you want to see in the morning as you're having your first cup of coffee and scanning the interwebz for cat videos is a notice from his "Have I Been Pwned" breach-alert service.
Britain's GCHQ intelligence agency dismissed as "utterly ridiculous" claims that it conducted surveillance on then-candidate Donald Trump at the request of President Obama. The White House reportedly apologized to the British government for its comments.
As cyber criminals develop new attack techniques in an evolving technology environment, organisations need to be aware of them to stay safe.
Download this whitepaper to learn the top 5 trends to stay safe in 2017.
The practical reality for many organisations is that they are spending more money on security, and are expending more and more energy addressing staffing challenges; but these same organisations are simply "spinning faster" but not making any true progress. Something has to change. At the risk of employing an overused...
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don't always volunteer.
Download...
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago - through VPNs, proxies, and remote desktops. These
technologies require enterprises to establish trust with each user and device, then provide access through a network...
In the wake of ongoing data breaches, organizations are spending more money to ensure their networks and applications - and the data they possess - remain secure. Enterprise global spending on information security will reach $75.4 billion in 2015, an increase of 4.7% over 2014 according to Gartner, driven in part by...
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity.
Download this eBook that will discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture.
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Keeping your data safe requires forward-thinking approaches to cybersecurity.
Download this whitepaper to learn how you can augment your existing...
As challenging as ransomware has proven to be against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge at detecting malware. Lastline's Engin Kirda explains how.
"Ransomware is a threat that needs to be taken seriously," says Kirda, cofounder and chief...
As effective as ransomware has proven to be in attacks against so many organizations across regions and sectors, certain characteristics actually can help defenders gain an edge in detecting malware. Lastline's Engin Kirda explains how.
Hackers have been targeting the likes of AOL and Yahoo, in part, because a certain generation of users - including many senior U.S. officials - continue to use the services to send and store state secrets. Let's make sure future generations don't make similar mistakes.
The rapid evolution of malware and proliferation of solutions have created a state of chaos for security leaders, says Naveen Palavalli of Symantec. What strategy and solutions will help restore order to anti-malware defense?
Feeding this sense of chaos is the sheer amount of malware being created, says Palavalli,...
Two of the four individuals indicted for hacking Yahoo in 2014, exposing 500 million user accounts, work for a Russian intelligence service unit that the FBI collaborates with on international cybercrime investigations.
Don't trust the internet of things to maintain common-sense boundaries - or your privacy - as evidenced by a lawsuit against "sensual lifestyle products" manufacturer We-Vibe, alleging that its products tracked customers' usage patterns, indexed by their email addresses.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.