Archive

Back to homepage
Industry Insights

CISOs Reveal the Most Likely Culprits for Data Leaks

As an ITAD and data center migration company, Exit Technologies has a vested interest in data security. In this regard, we consulted with several CISOs on the topic of cybersecurity. Specifically, what

Software

Cryptocurrency Platform Suffers Data Breach

Using its Facebook page to connect with global customers, Atlas Quantum, a cryptocurrency investment platform, announced a security incident that exposed the personal details of about 261,000 users, according to Have I Been

Uncategorized

THE CYBER SECURITY PLACE PARTNERS WITH IFINSEC FINANCIAL SECTOR IT SECURITY CONFERENCE & EXHIBITION

IFINSEC Financial Sector IT Security Conference and Exhibition Date: 13-14 November 2018 Location: Istanbul – Turkey Event Website: www.ifinsec.com  Email: [email protected]   Reminder: Early bird delegate registration fee is valid

Software

Don’t Let the End of Microsoft Extended Support Put Your Systems at Security, Legal or Compliance Risk

By Connor Cox, Director of Business Development at DH2i With Microsoft Extended Support for SQL Server 2008 and 2008 R2 ending in just under a year, there are a number of

Hardware/Network

Global Survey Shows Companies Are Using More Automation in Cybersecurity, But Still Have Work to Do

Skybox® Security, a global leader in cybersecurity management, has released the results of a global survey conducted by Osterman Research, Understanding Security Processes and the Need to Automate. The survey, which includes responses

Industry Insights

The dangers of a false sense of security

Consumers trust and expect businesses to keep their personal data safe. They take it for granted that organisations, especially large ones, have the resources to deliver business resilience; with the

Software

Secrets of ‘shift left’ success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs. When

Industry Insights

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances

Mobile

Mobile operators must take more responsibility over our phone security

Cybercriminals have become increasingly adept at tricking telecoms into granting them access to customer’s phones. So you think you’re pretty security savvy. You use complex passwords for all your online

Software

Rise in BEC attacks highlights need for heightened email security

Targeted malware, phishing attacks and socially-engineered impersonation attacks still reach employee inboxes. Business Email Compromise (BEC) attacks have increased by 80 per cent according to Mimecast’s latests quarterly Email Security