cybersecurity

Image for THAT .SUCKS – PROTECTING YOUR BUSINESS FROM A REPUTATIONAL NIGHTMARE
Business

THAT .SUCKS – PROTECTING YOUR BUSINESS FROM A REPUTATIONAL NIGHTMARE

Brands’ and celebrities’ worst nightmares could be about to become a reality this June w...

25th March, 2015

Image for THE NEW BANK HEIST: NO MASK REQUIRED
Banking

THE NEW BANK HEIST: NO MASK REQUIRED

By Ofer Or The banking industry is no stranger to cyber-attacks. The latest attack uncovered by Kasp...

25th March, 2015

Image for COMPANIES LEFT IN THE DARK AS TWO-THIRDS ADMIT CLOUD APPS BEING IMPLEMENTED WITHOUT THEIR KNOWLEDGE POSE A SECURITY THREAT
Top Stories

COMPANIES LEFT IN THE DARK AS TWO-THIRDS ADMIT CLOUD APPS BEING IMPLEMENTED WITHOUT THEIR KNOWLEDGE POSE A SECURITY THREAT

Centrify Cloud Expo Europe poll shines light on shadow IT More than two-thirds (67 per cent) of orga...

19th March, 2015

Image for THE 2015 PAYMENTS THREATSCAPE
Technology

THE 2015 PAYMENTS THREATSCAPE

2014 was a demanding year in cyber security, with many large, household brands becoming victim of fr...

11th March, 2015

Image for MAILPROTECTOR AND ZYCKO ANNOUNCE DISTRIBUTION PARTNERSHIP
Top Stories

MAILPROTECTOR AND ZYCKO ANNOUNCE DISTRIBUTION PARTNERSHIP

Zycko, an international specialist distributor of innovative IT solutions, has announced a new relat...

6th March, 2015

Image for FORESCOUT APPOINTS MICHAEL DECESARE, FORMER INTEL SECURITY PRESIDENT, AS CEO
Top Stories

FORESCOUT APPOINTS MICHAEL DECESARE, FORMER INTEL SECURITY PRESIDENT, AS CEO

ForeScout Technologies, Inc., a leading provider of continuous monitoring and mitigation solutions t...

3rd March, 2015

Image for RIVETZ CHOOSES INTERCEDE’S MYTAM SERVICE TO SECURE BITCOIN WALLETS AND E-COMMERCE TRANSACTIONS
Top Stories

RIVETZ CHOOSES INTERCEDE’S MYTAM SERVICE TO SECURE BITCOIN WALLETS AND E-COMMERCE TRANSACTIONS

Intercede loads Rivetz apps into the cryptographically-secured Trusted Execution Environment built i...

2nd March, 2015

Image for GOING BENEATH THE SURFACE OF ONLINE FRAUD PROTECTION: EXPLORING THE SUBCONSCIOUS
Top Stories

GOING BENEATH THE SURFACE OF ONLINE FRAUD PROTECTION: EXPLORING THE SUBCONSCIOUS

By: Ryan Wilk, Director of Customer Success, NuData Security Last year, cyber criminals got ahold of...

28th February, 2015

Image for SEVEN THINGS YOU NEED TO KNOW ABOUT INTERNATIONAL CYBER WARS
Top Stories

SEVEN THINGS YOU NEED TO KNOW ABOUT INTERNATIONAL CYBER WARS

Szilard Stange, Director of Product Management, OPSWAT The task of maintaining a secure digital envi...

26th February, 2015

Image for MAGENTO OWNERS AT RISK AGAIN FROM DANGEROUS MALWARE
Top Stories

MAGENTO OWNERS AT RISK AGAIN FROM DANGEROUS MALWARE

Security experts warn of a new threat to Magento owners that roots deeper into the platform to extra...

25th February, 2015

Image for INTERCEDE’S MYTAM ENABLES ENHANCED TRUST FOR ANDROID APPS TO PROTECT AGAINST HACKERS AND MALWARE
Technology

INTERCEDE’S MYTAM ENABLES ENHANCED TRUST FOR ANDROID APPS TO PROTECT AGAINST HACKERS AND MALWARE

Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environm...

19th February, 2015

Image for GEMALTO RELEASES FINDINGS OF 2014 BREACH LEVEL INDEX
Top Stories

GEMALTO RELEASES FINDINGS OF 2014 BREACH LEVEL INDEX

Data breaches increased 49 per cent in 2014 to 1 billion data records compromised, with cybercrimina...

17th February, 2015