Please turn on your JavaScript for this page to function normally.
fingerprint
How the access control market has developed and should direct itself in the coming years

Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …

talk
Do advances in voice technology pose a threat to enterprise security?

A new study from Aeriandi has highlighted UK organisations’ contradictory attitudes towards the voice channel, increasing the chances of their customers’, employees’ and …

handshake
Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget

With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and …

Gemalto survey
Businesses collect more data than they can handle, only half know where sensitive data is stored

With pressure to ensure consumer data is protected mounting, Gemalto today released the results of a global study which reveals that 65% are unable to analyze all the data …

Money
Dramatic increase in cryptocurrency money laundering

Three times more cryptocurrency was stolen from exchanges in the first half of 2018 than in all of 2017, according to CipherTrace. These dirty funds all need to be …

IoT
Global revenue from the IoT and analytics for utilities market is expected to grow

The utilities industry is attempting to leverage a plethora of generating assets, transmission and distribution system equipment, and smart meters connected to the grid, …

tools
How connected and secure is the modern workplace?

In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …

crowd
Consumers still happy to exchange data with businesses if there’s a benefit

Data privacy is the subject of much debate and discussion in the media. There has also been much speculation about the effects of recent changes to data privacy legislation …

glasses
Are privacy and personal identity impossible to protect?

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t …

businessman
Cybersecurity remains non-core competency for most C-suite executives

In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will …

arrows
Shift to microservices and continuous software delivery puts pressure on DevOps observability

A Scalyr report, based on a survey of 155 software development practitioners, finds that organizations are shifting away from traditional, monolithic architectures, with …

biohazard
Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular …

Don't miss

Cybersecurity news