Please turn on your JavaScript for this page to function normally.
Waterfall Unidirectional Security Gateway
Why Unidirectional Security Gateways can replace firewalls in industrial network environments

In this podcast recorded at IoT Solutions World Congress Barcelona 2016, Andrew Ginter, VP of Industrial Security at Waterfall Security, talks about Unidirectional Security …

Europe
Are you ready for the EU GDPR?

Current application test data management practices are not adequate to meet the compliance requirements of the EU General Data Protection Regulation (GDPR), according to CA …

traffic
Week in review: Tesco Bank breach, and a checklist for people who understand cyber security

Here’s an overview of some of last week’s most interesting news and articles: Bug in Chrome for mobile exploited for drive-by Android malware downloads Users of …

facepalm
Millions of job seekers’ info exposed via easily accessible database backups

A data leak has exposed sensitive information about millions of job seekers that used global recruitment firm Michael Page. The leak has once again been revealed to the …

lock
How to prepare your company for cybersecurity threats

When the FBI announced the arrest of a Russian hacker in October, it was notable – but maybe not for the reason you’d expect. Yevgeniy N., who was picked up in Prague, is …

CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

cloud computing
SMBs risk data security by using free cloud storage

SMBs risk data security if they use free cloud storage, but nearly 25% still do, despite warnings from industry experts. In addition, new findings reveal that 11% of SMBs are …

Security
New infosec products of the week​: November 11, 2016

Norton Mobile Security for Android boosts security and privacy protections A new version of Norton Mobile Security for Android has been released. The App Adviser feature, …

email
Malicious spam volume hits two year high

According to the Kaspersky Lab Spam and Phishing in Q3 report, the company’s products blocked 73,066,751 attempts to attack users with malicious attachments. This is the …

hole
The cybersecurity gap between IT capabilities and business expectations

Deloitte has uncovered a shift in business priorities from “business performance” to “customers,” with 57 percent of chief information officers …

checklist
A checklist for people who understand cyber security

By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …

Telegram
Telecrypt ransomware uses Telegram for command and control

Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …

Don't miss

Cybersecurity news