Please turn on your JavaScript for this page to function normally.
Cato Networks
Review: Cato Cloud

The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato …

GDPR
Navigating GDPR in the mobile enterprise

Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

puzzle
How large businesses approach cybersecurity today

Over 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats. Clutch surveyed over 300 …

work
BH Consulting launches scholarship programme to address infosec skills gap

BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under …

world intelligence
Week in review: Cyber threat hunting, Android DDoS botnet, drone bug bounty

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails …

Canadian university scammed out of $11.8 million

MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers. “On Wednesday, August 23, MacEwan University discovered it had been the victim of a …

biohazard
Locky ransomware returns with new tricks up its sleeve

Locky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam …

clock
The real cost of alarm fatigue

One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

consumer
What’s the use of a privacy policy?

In 2012 it was reported that “16% of Internet users claim to always read privacy policies of the sites and online services with which they share their private …

architecture
New infosec products of the week​: September 1, 2017

Palo Alto Networks announces Next-Generation Security Platform for VMware Cloud on AWS Palo Alto Networks announced its Next-Generation Security Platform is available to …

Trojan
Stealthy backdoor used to spy on diplomats across Europe

A new, sophisticated backdoor Trojan has been used to spy on targets in embassies and consulates across Southeastern Europe and former Soviet Union republics. ESET researchers …

instagram
Attackers exploited Instagram API bug to access users’ contact info

Instagram has confirmed that “one or more individuals obtained unlawful access to a number of high-profile Instagram users’ contact information — specifically …

Don't miss

Cybersecurity news