Tag "Information Security"

Back to homepage
Industry Insights

Top tips for securing your financial institution

For financial business leaders it’s important to understand that cyber-security is now a key business enabler, rather than simply a part of the overall IT strategy.As anyone working in the

Software

Signing Up for Benefits? Beware of Phishing Attacks

In addition to being National Cyber Security Awareness Month (NCSAM) in the US, October also marks the beginning of a lucrative two-month phishing season. Over the next two months, the

Software Uncategorized

What is Blockchain? Everything you need to know

Like much of the technology world, cryptocurrencies such as Bitcoin still rely on some form of database that are able to track large volumes of transactions and keep them secure.The

Software

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

The Necurs botnet, a large and well-known spam originator, has become synonymous with cybercrime. Its spam-sending capabilities, through a botnet of a few million infected devices, are frequently dedicated to

Software

Most hosting providers take too long to remove malware distribution sites

How long does it take web hosting providers to remove malware distribution sites parked on their network? Roman Hussy, the Swiss security activist behind abuse.ch, says that, on average, it

Software

DevOps and digital transformation initiatives are creating insecure apps

WhiteHat Security released its 2018 Application Security Statistics Report, “The Evolution of the Secure Software Lifecycle,” which identifies the security vulnerabilities and challenges introduced into the enterprise through traditional applications,

Industry Insights

Information Security Advice For Small And Medium Business

Most small and medium sized businesses (SMBs) do not have enough defenses in place to protect, detect or react to attacks, making them an easy target for cyber attackers. In

Industry Insights

Awareness – seriously?

I’m going to address the question of how we get staff to take security awareness (and by ‘security awareness’ I mean Cyber/Information/IT and Physical) more seriously, and it should come

Industry Insights

8 Ways To Empower Your Security Operations Center

When it comes to building a security operations center (SOC), it can be hard to know where to start. Even if you’re making sure the security operations team you already

IT Compliance

You gotta fight, for your right, to erasure

According to Article 17 of the European Union’s General Data Protection Regulation (GDPR), all personal data that is no longer necessary must be removed and deleted. This aspect of the law, also