Tag "Cyber Threats"

Back to homepage
Industry Insights

Why Are Businesses Ignoring Security Threats?

A surveyed compiled at the RSA security conference showcases that lots of businesses are behind with proper security standards. Some company’s are completely ignoring security threats due to lack of

Software

Building an effective cyber defence against polymorphic malware

Jan Van Vliet, VP and GM EMEA at Digital Guardian, goes through the best practices to protect against polymorphic malware.Recent research suggests as much as 97% of all malware infections

Industry Insights

Many adults want to reskill for cybersecurity careers

A new survey from Champlain College Online shows that not only are the majority of Americans concerned about cybersecurity threats, but many are willing to consider returning to college to

Software

LuckyMouse Group is back and using a legitimate certificate to sign Malware

The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor –

Industry Insights

A case for more accessible cybersecurity

If you’re a part of the infosec community, you’re likely all too familiar with the frantic calls, text messages and emails we receive from our friends and family about how

Software

APIs: The Trojan horses of security

At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API)

Hardware/Network

The evolution of DDoS attacks – and defences

In October 2016, a new method for distributing DoS attacks emerged – using a network of Internet of Things (IoT) devices to amplify attacks. What is the biggest cyber-threat to

Industry Insights

43% of Security Pros Could Execute Insider Attack

A recent survey of nearly 200 IT professionals about insider threats found that nearly half of the participants believed they could successfully attack their organizations from the inside. In a blog

Software

Blocking compromised passwords: How and why to do it

Passwords are beginning to feel like the zombie that just won’t die. Even after Bill Gates famously called for their demise in 2004, this antiquated form of user verification is

Hardware/Network

A game of hide and seek: find out what is lurking in the shadows

Find what is lurking within the far reaches of your corporate network so that you can plug the gaps opened up by the myriad Internet of Things. The trend towards