Pro CIOs in fear of extortion and ransomware Logicalis survey finds security getting in the way of digital transformation 11 Jun
Life Apple, Google harden smartphones against hackers and governments Smartphone, OS makers adapt to protect user data 11 Jun
Pro Hybrid cloud opportunity to reassess IT TechFire hears that hybrid cloud is an opportunity in more ways than one, but conservatism can prevent full engagement 28 May
Pro Evolving endpoint security trends In a rapidly developing category, here’s a look at what to expect 28 May
Life Intel, Google and Microsoft confirm new CPU vulnerability Variant 4 uses speculative execution, a feature common to most modern processor architectures 22 May
Pro Sophos’ Project Darwin embraces AI to combat evolving threats Chief innovation officer says the cyber defence industry must join together in applying AI to security decisions 18 May
Pro IT’s biggest compliance headaches and how to address them Industry experts discuss what new regulations mean, and what IT can do to mitigate issues, both old and new 10 May
Pro Signs of an advanced persistent threat attack Valuable data on your network? Odd network behaviour spotted? You may have been the victim of an APT attack 26 Apr
Life Apple releases updates for iOS 11.3 and macOS 10.13.4 High Sierra The updates include security patches and a fix for iPhones 25 Apr
Life Microsoft boosts anti-phishing skills of Chrome Windows Defender Browser Protection add-on that effectively gives up a major asset in its Edge browser 24 Apr
Pro Minimise IoT security vulnerabilities A set of tips to help avoid common mistakes when bringing IoT devices onto enterprise networks 23 Apr
Pro The hottest cybersecurity products at RSA 2018 The RSA Conference has become a key venue for cybersecurity vendors to announce new products. Here are a few of the most interesting new tools being... 18 Apr
Life Two vendors now sell iPhone cracking technology – and police are buying Cellebrite, Grayshift offer ways around iOS encryption 16 Apr
Pro Evolution characterises developing cyberthreats Verizon breach report shows refinement, not re-invention, says data scientist 11 Apr
Pro Why do biometrics fail? The tech is nothing new, but with growing excitement about consumer use of biometrics – and questions around its use law enforcement and counter... 11 Apr
Pro The myths of API security In light of Panera Bread’s API-related data breach, here what is and isn’t true about protecting application programming interfaces 10 Apr
Pro Gamification may help defeat cyber crooks Security managers will have difficulty or find it impossible to defend against cyberattacks, says report 9 Apr
Life Microsoft adds ransomware protection to OneDrive, Outlook.com New measures to complete rollout in coming weeks 6 Apr
Pro IT pros lack confidence in ability to detect and contain cyber breaches Less than half of all organisations were able to detect a major cybersecurity incident within an hour, finds report 6 Apr
Pro Deepfakes are just the beginning for cybersecurity’s face-swap nightmare Developments in machine learning are likely to have major implications for computer security 5 Apr
Life Intel finishes Spectre patching, some older CPUs won’t receive planned updates Say goodbye to Core 2 4 Apr
Pro Why you need a chief privacy officer Businesses today run on data, but with great value comes great risk. Here are five good reasons to hire a CPO 3 Apr
Pro Security-as-a-Service market hit $4bn last year Canalys estimates the total security market was worth $31 billion in 2017, up 10% 29 Mar
Pro The myths believed by CEOs about security Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions, argues Roger A Grimes 27 Mar
Pro IoT security spending to peak above $1.5bn next year Corporate spending to protect internet of things devices will to be driven by regulatory requirements, Gartner says 26 Mar
Pro Blockchain to ‘radically’ transform anti-fraud, anti-money-laundering efforts Enterprises will need blockchain's immutability and security to thwart bad actors 23 Mar
Pro Inside Track: Data Protection – understanding and insight Tools and technology can help, but understanding the data and its usage is more important for compliance, reports ALEX MEEHAN 20 Mar
Pro The insider threat: learning hard lessons A lot can be learned from recent incidents on the scale and scope of the insider threat 20 Mar
Life Intel plans changes to protect future chips from Meltdown and Spectre Chip maker patched five years' worth of hardware. Next up: Fending off possible exploits. 15 Mar
Pro Security’s role in digital transformation Digital transformation is foremost in the mind of many senior executives, but too often security is overlooked 14 Mar
Pro Distributed denial of service attacks are evolving DDoS attacks have been part of the criminal toolbox for twenty years, but are now increasing in frequency and impact 13 Mar
Pro Building a cybersecurity strategy Understanding all the basic elements to cybersecurity is critical in developing a comprehensive strategy 12 Mar
Pro CIOs need ‘attitudinal shifts’ towards risk Cyber guru urges CIOs to re-conceptualise risk for business impact 9 Mar
Pro Recent cyberattacks show worrying trends From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough in IT security 8 Mar
Life Australian cops aim high with signal jamming drone guns DroneGun looks like a rifle, but instead of bullets, it fires a radio signal 1 Mar
Pro Another massive DDoS internet blackout could be imminent Check your DNS, and please, make it redundant. 1 Mar
Pro Getting the most from a next gen firewall NGFWs have a lot of useful features, but they only work if they are used and configured properly, and regularly updated 28 Feb
Subscribers 0
Fans 0
Followers 0
Followers