BLOG

What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered including: the ethics of paying ransoms, to politicised destructive attacks and the new ‘anchors’ of compute infrastructure in a remote world. Here we look at some of the key discussion points:

Read More


BLOG

The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers to a halt was borne out of a student’s bedroom in the Philippines, just over 20 years ago. Mark Nutt, EVP EMEA at Veritas, is taking a look back at when the computer virus was unleashed and the ripples it sent forward in time. Not only did “LoveBug” infect over 45 million devices, but it became a catalyst for the multi-billion-dollar ransomware crime industry that we know today.

Read More



NEWS

Remote working leads to increases in cyber attacks

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working practices brought on by COVID-19, with 65% of organisations noting they have either been breached or exposed to an attack. That’s one of the key findings from HLB’s Cybersecurity Report which launched recently.

Read More

Featuring on-premises, controllable enterprise proxy to securely monitor and process automated...
A new report published by CREST looks for solutions to the increasing problems of stress and...
Passwords are a cornerstone method for securing access to data. However, a new survey...
Retail, Hospitality, Travel industries were hit with over 63 billion credential stuffing and 4...
Onfido’s trusted identity verification to power onboarding for Microsoft’s new digital wallet...
Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more