
Moving towards compliance: GDPR issues and challenges
In this podcast, Mike McCandless, VP of Sales and Marketing for Apricorn, and Jon Fielding, Managing Director for Apricorn EMEA, discuss the European Union General Data …

iStorage introduces ultra-secure hard drives
iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …

Endpoint Protector 5: Responsive interface and updated eDiscovery module
CoSoSys released Endpoint Protector 5 with updates on the management console which has been redesigned for a modern, user-friendly and responsive experience. “Endpoint …

Centrify Identity Platform now secures Mac endpoints
Centrify announced enhancements to the Centrify Identity Platform that deliver local administrator password management for Macs and Mac application management and software …

Google CTF 2017 announced: Test your skills!
Google has announced the 2017 edition of its Capture The Flag (CTF) competition. As before, the event is divided into two rounds: The qualification round, to be held online on …

Introducing security into software through APIs
Application programming interfaces (APIs) can make life easier for software developers, allowing them to concentrate on what they do best and preventing them from being forced …

Enterprise endpoint security: Millions of devices still running outdated systems
Duo Security analyzed the security health of 4.6 million endpoint devices, including 3.5 million mobile phones across multiple industries and geographic regions. With …

High-Tech Bridge named a Cool Vendor by Gartner
High-Tech Bridge has been named a Cool Vendor in Gartner’s May 2017 research “Cool Vendors in Security for Midsize Enterprise 2017” by Adam Hils. High-Tech …

The cost of IoT hacks: Up to 13% of revenue for smaller firms
Nearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, …

Police dismantle organised crime network suspected of online payment scams
The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime …

Week in review: Fireball malware infects 250 million computers, attacks within the Dark Web
Here’s an overview of some of last week’s most interesting news and articles: OneLogin suffers data breach, again OneLogin, a popular single sign-on service that …

What’s really stopping users from adopting secure communication tools?
“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance