Posts From administrator

Back to homepage
Software

Taken by Ransomware? Certain Skills Required.

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Hardware/Network

Focus on security and standards to reap IoT rewards

Organisations are now investing billions in the Internet of Things (IoT) to create business efficiencies and improve productivity. Gartner claims that over a third (37 per cent) of the 8.4

Hardware/Network

Five network security threats facing retail – and how to fight them

Digital networks are now the backbone of every retail operation. But they are also a very attractive target for cyber criminals. Paul Leybourne of Vodat International examines the key cyber

Identity Theft

Inside look at lifecycle of stolen credentials and extent of data breach damage

Shape Security released its Credential Spill Report, shedding light on the extent to which the consumer banking, retail, airline and hospitality industries are impacted by credential stuffing attacks and account

Identity Theft

Retail data breaches continue to reach new highs

Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to

Hardware/Network

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as

Hardware/Network

Shrouding IoT Security in the Fog

The world is undergoing the most dramatic overhaul of our information service infrastructure ever, driven by the “connected everything” movement.While the benefits of connected data are indisputable – better decisions

Industry Insights

Security by Design – Future-Proof

How does one “future-proof” a security program? What does “future-proof” even mean? “Future Proof” refers to an organization, business, program or product that performs all of the right jinks (moves)

Cloud

How to use the cloud to improve your technology training

Anyone who has tried to hire an IT expert knows that the shortage of qualified people is real. We’re not just talking about IT security jobs, either. Almost every area of tech

Hardware/Network Mobile

Protecting a Mobile Workforce with Hybrid DNS Security

It is expected that half of the UK’s workforce will be working remotely by 2020, accessing the corporate network via mobile devices and the cloud. If true, this prediction is likely to