
7 trends driving enterprise IT transformation in 2019
Enabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agencies in 2019. Tech companies will need to …

Photos: HITBSecConf2018 Dubai, part two
After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with …

Why compliance is never enough
Organizations are well aware of the security risks inherent in our hyper-connected world. However, many are making the mistake of focusing their attention on being compliant …

Take cybersecurity into your own hands: Don’t rely on tech giants
Google doesn’t want you to have to think about cybersecurity at all, similar to how we think about breathing, which sounds like a great idea. However, in all of my years in …

Cybersecurity 2019: Predictions you can’t ignore
As we move forward to 2019, expect credit card and payment information theft to continue to rise. Yes, this isn’t a major surprise; however, if organizations can better …

Key reasons holding back MFA adoption by mainframe customers
While 64 per cent of mainframers are aware that multi-factor authentication (MFA) is now available to control access to mainframe applications, only 20 per cent acknowledge …

Photos: HITBSecConf2018 Dubai
After an 8-year gap, the Hack In The Box conference once again opened its doors in Dubai. The conference features a Capture the Flag competition, a technology exhibition with …

Product showcase: Cynet 360 Security Platform
Resource-constrained companies that want to protect their internal environments from cyberattack face an impossible challenge: they need to spend a lot of money to buy …

Why you shouldn’t be worried about UPnP port masking
Last May, security firm Imperva wrote a blog post discussing a new proof of concept for bypassing DDoS mitigation after discovering reflected network protocols appearing on …

ATM attackers strike again: Are you at risk?
The United States National ATM Council recently released information about a series of ATM attacks using rogue network devices. The criminals opened the upper half of the ATM …

The current state of cybersecurity in the connected hospital
Abbott and The Chertoff Group released a white paper that shares key findings from a recent study of 300 physicians and 100 hospital administrators on cybersecurity challenges …

GDPR’s impact: The first six months
GDPR is now six months old – it’s time to take an assessment of the regulation’s impact so far. At first blush it would appear very little has changed. There are no …