Keeping data swamps clean for ongoing GDPR compliance
The increased affordability and accessibility of data storage over recent years can be both a benefit and a challenge for businesses. While the ability to stockpile huge …
7 trends driving enterprise IT transformation in 2019
Enabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agencies in 2019. Tech companies will need to …
Photos: HITBSecConf2018 Dubai, part two
After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with …
Why compliance is never enough
Organizations are well aware of the security risks inherent in our hyper-connected world. However, many are making the mistake of focusing their attention on being compliant …
Take cybersecurity into your own hands: Don’t rely on tech giants
Google doesn’t want you to have to think about cybersecurity at all, similar to how we think about breathing, which sounds like a great idea. However, in all of my years in …
Cybersecurity 2019: Predictions you can’t ignore
As we move forward to 2019, expect credit card and payment information theft to continue to rise. Yes, this isn’t a major surprise; however, if organizations can better …
Key reasons holding back MFA adoption by mainframe customers
While 64 per cent of mainframers are aware that multi-factor authentication (MFA) is now available to control access to mainframe applications, only 20 per cent acknowledge …
Photos: HITBSecConf2018 Dubai
After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with …
Product showcase: Cynet 360 Security Platform
Resource-constrained companies that want to protect their internal environments from cyberattack face an impossible challenge: they need to spend a lot of money to buy …
Why you shouldn’t be worried about UPnP port masking
Last May, security firm Imperva wrote a blog post discussing a new proof of concept for bypassing DDoS mitigation after discovering reflected network protocols appearing on …
ATM attackers strike again: Are you at risk?
The United States National ATM Council recently released information about a series of ATM attacks using rogue network devices. The criminals opened the upper half of the ATM …
The current state of cybersecurity in the connected hospital
Abbott and The Chertoff Group released a white paper that shares key findings from a recent study of 300 physicians and 100 hospital administrators on cybersecurity challenges …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online