Please turn on your JavaScript for this page to function normally.
GDPR
As GDPR implementation date approaches, cyber risk gets more attention

The upcoming implementation of the European Union’s General Data Protection Regulation (GDPR), which takes effect in May 2018, has elevated cyber risk to the top of the …

chess
Using a robust platform for cyber threat analysis training

We have recognised threats coming more regularly from varied origins such as nation-states, hacktivist and cybercriminal actors. Coupled with many new public policies aimed at …

Office 365
Office 365 adoption drivers, risks, and opportunities

Over 1,100 organizations ranging from single-person businesses to companies with more than 10,000 employees participated in a survey from various regions around the globe …

building blocks
Almost half of non-IT and data pros don’t understand blockchain

A survey of over 200 board level UK executives has found that while over half of businesses sampled are planning blockchain initiatives, less than 1 in 10 believe they have …

talk speak speaker
Week in review: iOS phishing, and three reasons to secure your data now

Here’s an overview of some of last week’s most interesting news and articles: Inventive cyber gang steals millions from East European banks Trustwave researchers …

now
Why wait to be breached? Three reasons to secure your data now

“I’m working on it.” “We don’t have room in this year’s budget.” “Something else more important came up.” “Well, we’ve not been …

Degree
Four ways colleges can strengthen their cybersecurity programs

If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says …

mobile worker
Enterprises increasingly leveraging endpoint data for security investigations

Code42 confirmed how critical it is for organizations to access and leverage endpoint data for additional uses above and beyond backup and recovery. Among 155 IT professionals …

DDoS
DDoS attacks: Brands have plenty to lose, even if attacked only once

DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage on brands. Neustar discovered that brands experienced a …

degree
Main cybersecurity problem for colleges? Gathering diverse kinds of data

Each time a major retailer, credit bureau or healthcare provider experiences a significant data breach, even the experts in cybersecurity circles wonder, “What could be …

skull
Dark web ransomware economy: Sellers pulling in six-figure salaries

There are currently more than 6,300 estimated dark web marketplaces selling ransomware, with more than 45,000 current product listings, according to new research by Carbon …

Network
Investigation reveals large botnet hiding behind Fast Flux technique

Fast Flux, a DNS technique first introduced in 2006 and widely associated with the Storm Worm malware variants, can be used by botnets to hide various types of malicious …

Don't miss

Cybersecurity news