Posts From administrator

Back to homepage
Hardware/Network

Healthcare’s blind spot: Unmanaged IoT and medical devices

From imaging to monitoring systems, infusion pumps to therapeutic lasers and life support machines, medical devices are used to improve and streamline patient care. Many of these are networked and

Hardware/Network

How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that.

Software

Protect Your Organization Against Password Spraying

Password spraying, unlike traditional brute force attacks, often stays under the radar. Instead of targeting a single account with multiple password guesses, password spraying uses a high-probability password against multiple

Industry Insights

Key Security Tactics to Ensure CISOs Don’t Have a Terrible Day

Have you ever had one of those days? Not just a waking-up-on-the-wrong-side-of-the-bed morning, but one of those soul-sucking, I-hope-the-earth-swallows-me-alive days? I’d like to introduce you to Alex, the CISO (chief

Industry Insights

How to build a comprehensive cyber security strategy

Thanks to digital transformation, securing data across the business is more challenging than ever. Most, if not all businesses know the importance of protecting themselves against cyber threats. If your

Artificial Intelligence

Crypto-attacks are rising in Asia – and cybersecurity AI may be the best way to fight the threat: Darktrace

Cybersecurity company Darktrace says crypto-attackers have turned to more sophisticated and highly personalised methods to siphon tokens from victims. In the realm of cryptocurrency, the dangers of clandestine cyber attacks

Cloud

New Open Source Solution Reduces The Risks Associated With Cloud Deployments

The technology will fight to protect people using desktop applications running on digital platforms such as Amazon Web Services (AWS). Galahad will leverage nested virtualization, layered sensing and logging to

Mobile

Mobile ID Schemes Take The Lead Over Digital Identity Cards

Emerging economies in Asia and Africa are some of the biggest markets, as countries leapfrog analogue identities to benefit from the efficiencies digital registration and management bring. Click here to

IT Compliance

Authentication in the Age of GDPR

It’s been over a year since the enforcement of the long-planned General Data Protection Regulation (GDPR) began, marking the start of a new regulatory era for data management. GDPR impacts

Hardware/Network

Over 800K Systems Remain Vulnerable to Bluekeep

Over 805,000 computers around the world are still vulnerable to the critical Bluekeep vulnerability, which experts have warned could create a worm-like threat worse than WannaCry. Security firm BitSight claimed that, as