Pro Microsegmentation architecture: choices and benefits Architecture types include host-agent segmentation, hypervisor segmentation and network segmentation 17 Apr
Pro Cisco urges customers to patch critical UCS security holes now Posted several security warnings concerning authentication vulnerabilities in its Unified Computing System 16 Apr
Pro IBM extends z15 mainframe family, intensifies Linux security IBM reshaped the mainframe with an eye toward further integrating it within hybrid clouds and further securing Linux-based workloads 16 Apr
Pro Ireland has highest proportion of cyber security leaders globally Report identifies what domestic organisations need to do differently to better defend against cyberattacks 14 Apr
Pro Dark Nexus: evolving IoT botnet targets variety of devices Botnet has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks 9 Apr
Insights Leveraging remote security testing to support business continuity Delivering a full suite of security tests remotely 8 Apr
Pro Cyber attack prevention better than cure Ponemon study measures benefits of cyber attack prevention 8 Apr
Pro Asavie unveils clientless solution to solve digital enterprise challenges Solution enables enterprises to extend their private networks and SD-WAN to secure mobile and IoT endpoints without the need for a client 8 Apr
Pro Zoom pauses new feature development to focus on privacy, security 'Zoom-bombing' has become an unwelcome phenomenon as the video conferencing vendor gains users 6 Apr
Pro Hackers can steal Windows credentials via links in Zoom chat Attack can be prevented by making changes to the Windows settings, or by using the Zoom Web client 3 Apr
Pro How US enterprise networking is changing with a work-at-home workforce Surge in remote working has placed unforeseen strain on networking technologies 3 Apr
Pro Cybercriminal group mails malicious USB dongles to targeted companies Recent attack is the first known use of the BadUSB exploit in the wild 30 Mar
Pro Building redundancy into security teams Four practices to reduce the risk of Covid-19 wreaking havoc on your business 24 Mar
Pro Staying operational during an outbreak SonicWall discusses protection of remote and work-from-home employees 23 Mar
Pro Covid-19 offers a unique opportunity to pilot zero trust, rapidly and at scale Model addresses security concerns around supporting large numbers of remote workers 23 Mar
Pro Free security resources for remote workers Security vendors are helping organisations better protect their networks 19 Mar
Pro Report: Shadow IoT is prevalent, insecure Zscaler data shows huge amounts of unencrypted IoT traffic moving in and out of enterprise networks 16 Mar
Pro Next wave of digital transformation requires better security, automation F5 report highlights the challenges of digital initiatives 12 Mar
Pro Verizon expands security portfolio to combat cybercrime Three new security solutions designed to protect sensitive information announced 10 Mar
Pro How to work securely from home Irish business are encouraging workers to work remotely due to Coronavirus. Here’s how to facilitate it securely, says Sophos 10 Mar
Pro Intel CSME flaw is unpatchable, researchers warn Previously known flaw could allow attackers to compromise the cryptographic chain of trust in Intel systems 6 Mar
Life Google working on fixes for Home, Nest connectivity bugs If your smart speaker can’t maintain a solid wireless connection, you are not alone 5 Mar
Pro Companies will sacrifice mobile security for profitability, convenience, says Verizon While 70% of businesses suffered a major mobile compromise – nearly half continue to sacrifice security 3 Mar
Pro Cisco security warnings include firewall holes, Nexus software weaknesses Detailed security vulnerability warnings with Firepower firewall, Unified Computing System software, Nexus switch operating system 27 Feb
Pro How to prevent scripting attacks in Microsoft Office Rise in phishing attempts requires another look at your Microsoft Office settings to minimise the risk of a user executing a malicious script 26 Feb
Pro VMware bolsters cloud and DC security offerings Upgrades rely on technology it bought with the purchase of Carbon Black, Avi Networks, Cloud Coreo and CloudHealth 26 Feb
Trade MSPs ‘high value’ targets for ransomware attackers Managed service providers have become hot property for cyber criminals seeking a larger net of companies to attack 25 Feb
Pro 5G security is a mess. Time for digital certificates? 5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages 24 Feb
Pro Employer overconfidence, skills shortages in cyber security Microsoft research indicates dichotomies in perceptions of readiness and security 20 Feb
Pro APIs are becoming a major target for credential stuffing attacks Attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable 20 Feb
Pro How blockchain could help block fake news Creating an immutable ledger to track metadata associated with published content shows promise as a method for identifying authentic news 18 Feb
Longform Phishing: what it is and how to stop it Here's what you need to know about this increasingly sophisticated form of cyber attack 18 Feb
Pro Security, management and advantage in multicloud Cloud environments can be hard to manage, with platform knowledge, in-house skills and tools all at a premium 14 Feb
Pro BlackBerry Digital Workplace eliminates need for VPN, VDI BlackBerry’s desktop and access browser integrated with Awingu's secure browser-based workspace and AI-driven security software 14 Feb
Pro Who should lead the push for IoT security? Industry groups and governmental agencies have attempted to improve IoT security, but so far there’s nothing comprehensive 11 Feb
Pro Why ransomware might be your biggest threat Ransomware is more targeted, sophisticated and costly than ever 11 Feb
Pro Security vs. innovation: IT’s trickiest balancing act An innovative initiative is only as successful as it is secure 11 Feb
Pro Five firewall features IT pros should know about but probably don’t As a foundational network defence, firewalls continue to be enhanced with new features 10 Feb
Pro US Air Force to pilot blockchain-based database for data sharing Blockchain ledger will enable data ingest from legacy data systems and wikis as well as a native web application build platform 7 Feb
Trade HPE ups its security game with Scytale acquisition HPE has hedged its bets on a fledgling cyber security start-up 6 Feb
Subscribers 0
Fans 0
Followers 0
Followers