Pro DNSSEC key signing key rollover: Are you ready? Enterprises that rely on the DNSSEC protocol need to update their name servers before 11 October 12 Sep
Pro Equifax: website vulnerability exposed 143m US consumers Massive data breach discovered on 29 July 8 Sep
Pro Hackers have access to sabotage power in Europe and US Symantec report claims hacker access to energy firms 8 Sep
Pro Application layer DDoS attacks rising Attacks on the rise and organisations must take new steps to protect themselves 7 Sep
Life Intel chips could take over two-factor authentication from your phone First, make sure that your Windows password or PIN is secure 5 Sep
Pro Security firms coordinate to neutralise WireX botnet Researchers from at least seven organisations worked jointly to dismantle the WireX botnet after multiple DDoS attacks 29 Aug
Pro OpenJDK proposes special group to tackle Java security issues Private group would tackle code vulnerabilities currently handled without coordination—or not at all 28 Aug
Pro Worldwide infosec spending to reach $93bn in 2018 Global cybersecurity spending will exceed $1tr cumulatively over five years 24 Aug
Blogs Missing the point somewhat New report shows rise in phishing and related activity, but ‘sophisticated’ interpretations fail 18 Aug
Pro Attackers experiment with CVE-2017-0199 in phishing attacks Likely a test run, attacks less effective due to mistakes, say researchers 18 Aug
Pro Slack to integrate with EMM for enterprise security Admins can collaboration service with enterprise mobility management 14 Aug
Pro Schneider Electric partners with Claroty for industrial infrastructure security Partnership will bring real-time monitoring and deep inspection to industrial systems 10 Aug
Blogs An echo of opening shots Ransomware or cyberweapon? There is some argument over the nature of the recent NotPetya outbreak 3 Aug
Pro SSL/TLS attacks on the rise As encryption practices improve, cybercriminals turn to SSL/TLS vulnerabilities to deliver malicious attacks 2 Aug
Pro Why printers and MFPs need to be incorporated in an infosec strategy, argues Xeretec’s Cleare Often overlooked devices need protection as much as any other 2 Aug
Insights TechBeat: Securing your future – preparing for the unexpected These days, security is as much about the unanticipated as it is the old reliables, writes Paul Hearns 31 Jul
Pro Germany warns of nation-state cyberespionage threat Intel and security services say Russia, China and Iran target German companies 31 Jul
Pro SAP users warned of potential app vulnerabilities Survey finds more than half of tested systems under threat of malware attack 25 Jul
Pro Human hacking explained by Jenny Radcliffe Expert shares insights and warns that human hacking is never going away 21 Jul
Pro How to prevent phishing From employee rewards for savvy actions to showing how breaches are relevant to every-day duties, here are the tips to help prevent phishing attacks 12 Jul
Pro Rethinking success in security Security leaders need to celebrate success with a better definition of winning, argues Michael Santarcangelo 10 Jul
Trade Seven the magic number with latest vCloud.ie solution Kildare company releases world's first of its kind security package 7 Jul
Pro Ukrainian police seize computers that spread NotPetya Malware may have come form updates for tax and accounting app 6 Jul
Pro Tackling cloud security myths Too many people treat cloud security as a binary proposition, risking wasting money, security gaps, or both 5 Jul
Pro Kaspersky offers to turn over source code to US government Security firm said the US can audit source, in Russian influence controversy 4 Jul
Pro Savvius Spotlight advances network performance monitoring and troubleshooting Security capabilities add to network health portfolio 3 Jul
Blogs IoT: Do it, but do it well With a perfect storm of failure waiting, it cannot be either or when it comes to the Internet of Things 30 Jun
Pro Irish biometric tech to improve border security NUI Galway partnership chosen for US border security initiative 29 Jun
Pro Epyc win for AMD in the server security battle New server chip’s built-in security may prove as advantageous as its performance 29 Jun
Pro New ransomware attack is going global Petya variant ‘Petrwrap’ wreaks havoc from Ukraine to Ireland 27 Jun
Pro WannaCry’s wake-up call is a reminder about security processes The ransomware attack's fallout proves the need for more protected and solid patching systems 21 Jun
Pro Applicant surge reduces cybersecurity skills gap Despite jump in interest, risk remains, says Indeed 20 Jun
Pro Making cybersecurity a risk business Getting beyond perception and bias, an honest assessment of risk and exposure is the only measure for security spend, finds GORDON SMITH 19 Jun
Pro Towards successful virtual network deployment Create a team and take it a step a time, with an eye to the future, analyst advises 9 Jun
Pro Don’t like Mondays? Neither do attackers Reduce risks by knowing attack patterns, researchers advise 8 Jun
Pro IoT’s future will be fascinating, and potentially catastrophic Insecurity of IoT is a top concern, say experts 7 Jun
Subscribers 0
Fans 0
Followers 0
Followers