Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number…
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after…
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…
Are Encrypted Communication Apps used for Crime Operations?
By Nicole Allen, Marketing Executive, SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which…
Industry 4.0 under Threat Landscape
By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security terms. It appears that industry 4.0 is more than ever under the…
Analytics & Security Insight On 2021 And Beyond
Predictions for the Future of the Security Space By Billy Spears, Chief Information Security Officer, Alteryx 2020 has been a year unlike any other, with unforeseen challenges creating hurdles for…
How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy
By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work,…
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
China-linked APT31 group was behind the attack on Finnish Parliament
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to…
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert…
Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation
By Pedro Fortuna, CTO, Jscrambler Magecart has certainly garnered mainstream media attention over the last couple of years. Perhaps it’s the high profile nature of many of their targets (British…