Please turn on your JavaScript for this page to function normally.
DDoS
Stealthy DDoS attacks distract from more destructive security threats

The greatest DDoS risk for organisations is the barrage of short, low volume attacks which mask more serious network intrusions. Despite several headline-dominating, …

EU
Moving towards compliance: GDPR issues and challenges

In this podcast, Mike McCandless, VP of Sales and Marketing for Apricorn, and Jon Fielding, Managing Director for Apricorn EMEA, discuss the European Union General Data …

iStorage drives
iStorage introduces ultra-secure hard drives

iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …

CoSoSys Endpoint Protector
Endpoint Protector 5: Responsive interface and updated eDiscovery module

CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …

User key
Centrify Identity Platform now secures Mac endpoints

Centrify announced enhancements to the Centrify Identity Platform that deliver local administrator password management for Macs and Mac application management and software …

CTF
Google CTF 2017 announced: Test your skills!

Google has announced the 2017 edition of its Capture The Flag (CTF) competition. As before, the event is divided into two rounds: The qualification round, to be held online on …

architecture
Introducing security into software through APIs

Application programming interfaces (APIs) can make life easier for software developers, allowing them to concentrate on what they do best and preventing them from being forced …

Duo Security
Enterprise endpoint security: Millions of devices still running outdated systems

Duo Security analyzed the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions. With …

cloud
High-Tech Bridge named a Cool Vendor by Gartner

High-Tech Bridge has been named a Cool Vendor in Gartner’s May 2017 research “Cool Vendors in Security for Midsize Enterprise 2017” by Adam Hils. High-Tech …

IoT
The cost of IoT hacks: Up to 13% of revenue for smaller firms

Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

Police
Police dismantle organised crime network suspected of online payment scams

The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …

Abstract
Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web

Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …

Don't miss

Cybersecurity news