Software

Back to homepage

Cyberwar against NATO: Who are Earworm and APT28?

There is a group of cybercriminals who are really making things difficult for NATO. The group is called Earworm and, over the last few years, it has been doing what

DevSecOps: Fast development without sacrificing safety

DevOps has been a boon to companies looking to shorten the systems development cycle, pushing software developers and IT operations to work together and help their enterprises fulfil their business

1.5m Users Hit By New Facebook Privacy Breach As Extent Of Data Misuse Exposed

Facebook’s alleged data misuse hit the headlines (again) on Thursday as Business Insider revealed that the company had “harvested the email contacts of 1.5 million users without their knowledge or consent when

The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual organization,

EU: We Have No Evidence Kaspersky Lab is Security Risk

The European Commission has admitted it has no evidence that Kaspersky Lab products are a national security risk to member states, despite the European Parliament voting last summer for a ban on the

Your Password Manager Won’t Protect You: 3 Ways to Secure Your Data

If there’s anything harder than remembering the hundreds of passwords you have to use every day just to work, shop online, or read the news, it’s keeping those passwords safe

As IT security automation increases, so does the need for highly skilled staff

The adoption of automation for IT security functions is on the rise across the US, UK and APAC, the latest DomainTools/Ponemon report has shown. The report, which is based on

Bad security hygiene still a major risk for enterprise IT networks

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here’s what you can do to safeguard your business.Emotet is a banking Trojan that started out stealing

A quarter of phishing emails bypass Office 365 security

Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. “Cloud based email, with all of