Tag "Cyber Defence"

Back to homepage
Hardware/Network

Machines and Humans Team up for Cyber Security

By Anabel Cooper – Blogger, Machines and Humans Team up for Cyber Security When it comes to computing high volumes of mathematical calculations, there’s no way a human can compete

Hardware/Network

For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a

IT Compliance

What is behind the decline in cyber crime victim rates?

Investors in cyber security companies will have been heartened in recent weeks by financial results showing growing demand for their technologies. Businesses have spent heavily on cyber security measures over

Industry Insights

Banking on security

In the age of the internet, security is not about being large and immovable, it’s about being nimble and fast-moving to stay up-to-date with the latest tools, practices, hacks and

Software Security

What is the best form of cyber defence?

Undoubtedly, the biggest threat that businesses have to deal with today is cyber-attacks. From having files and systems locked by ransomware, through to denial-of-service attacks bringing down entire services, there’s

Software

“Sometimes There Is A Crystal Ball”

The ability to predict—and defend against—malicious activity is something of a holy grail in the realm of security. There are many technologies that seek to do it, and some of

IT Compliance

From Digital Defiance To Commercial Compliance

The boundary between data compliance and breaking the law is becoming increasingly fine. As the EU General Data Protection Regulation (GDPR) tears up the rulebook for how organisations digitally trade,

Software

Why it’s time to get serious to crypto-jacking: the ‘new age’ cyber threat

What’s becoming painstakingly apparent amidst these developments is the great lengths hackers will go to in order to take advantage of the systems of both public and private companies. Crypto-jacking

Software

Outdated cyber defences putting companies at risk

Legacy systems are no match for ransomware and other new cyber threats.As cyber threats such as phishing, malware and cryptojacking have grown increasingly sophisticated, new research has revealed that legacy

Identity Theft

Understanding The Strengths And Weaknesses Of Biometrics

Biometrics are fast becoming an integral part of online security. From the familiar fingerprint to cutting-edge retina scanning and facial recognition technology, it is increasingly the go-to mechanism for protecting