Tag "Security Breach"

Back to homepage
Artificial Intelligence

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.boc. Every time you connect to

Industry Insights

How penetration testing can help secure your company’s infrastructure

Any type of security breach can have an impact and far-reaching repercussions for a company and its customers.Infrastructure security is a top priority for all IT managers.  Organisations must be

Industry Insights

Stop the Noise, Time to Rationalize Cybersecurity

After years of the IT team banging their heads against the wall, the sheer volume of hacks and data breaches hitting the headlines on an almost daily basis has finally

Industry Insights

60% of businesses have experienced a serious security breach in the last two years

There is an increase in security breaches and businesses still face challenges surrounding cyberattacks due to lack of IT security and operations basics. With digital transformation on the rise and technology massively

Identity Theft

Cyber security not just IT’s problem: McAfee

New research shows over half of respondents reported a data breach at current organisation. IT security professionals are still struggling to fully secure their organisations and protect against breaches, according

Hardware/Network

Scientists may have identified a new way to improve network security

With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it.

Identity Theft Software

1.5m Users Hit By New Facebook Privacy Breach As Extent Of Data Misuse Exposed

Facebook’s alleged data misuse hit the headlines (again) on Thursday as Business Insider revealed that the company had “harvested the email contacts of 1.5 million users without their knowledge or consent when

Software

A quarter of phishing emails bypass Office 365 security

Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. “Cloud based email, with all of

Industry Insights

Security Is Key To The Success Of Industry 4.0

Manufacturing is a highly competitive industry. The continuous need to outperform competitors is to such a great degree that it is imperative for manufacturing organizations to protect their intellectual property

Expert Articles Network Security

What Got You Here, Won’t Get You There – When It Comes to Perimeter Security

By Don Boxley,CEO and Co- Founder at DH2i, Traditionally, the virtual private network (VPN) has been considered the most secure method by which to access networks. There’s an irony, though,