Network Security

Back to homepage

Has your corporate network been weaponised? Island hopping can compromise your brand and your country

By Rick McElroy – Security Strategist at  Carbon Black Since the dawn of the internet geopolitical tension has been the harbinger of increased cyberattacks. Over the years we have witnessed

Cybercriminals Work Around Road Blocks

Though somewhat deterred by the major takedown of two popular underground marketplaces, cybercriminals have found alternative solutions that are growing more popular, according to new research from Digital Shadows. Click here

Infographic: Communications Surveillance

By Secure Swiss Data Everything from monitoring, interception, collection, preservation to retention of information by a third party, that has been communicated, relayed or generated over communications networks to a group of

Infographic: What is Data Protection?

By Secure Swiss Data Your personal data is all about you: you’re the subject, the product and the prize. You may think your data is not worth it, but for those

WannaCry Ransomware – Small Medium Enterprise(SME) dilemma

By Kandarp shah, Advisor @ Allianz Cloud Pvt Ltd., [email protected]  A lot has been written and talked about the recent Ransomware attack that has affected around 74 thousand computers across

Global Data Center Logical Security Market to experience increase in growth by 2016-2024

By Dorothy Himes, Zion Market Research Data center logical security includes safeguards for software of a system for organization. This includes password access, user identification, access rights, authenticating, and authority

How To Protect Your Online Privacy With A VPN

Have you ever had a feeling that someone’s watching you when you’re walking down the street in the middle of the night? Chances are this feeling is eerily familiar to

How blockchain can contribute to WADA’s Defence against cyber-attacks.

By Ilaria Capitanio, D&D Consulting Services The cyber–attacks occurred throughout the summer to WADA (World Anti-Doping Agency) and the consequent revealing of athletes’ medical records have raised the necessity of

Retailers overconfident in endpoint security – Help Net Security

A new study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a

Attackers don’t need vulnerabilities when the basics work just as well | CSO Online

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin