EU leaders aim at boosting defense and security, including cybersecurity

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security.  During the recent video conference of the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on EU leaders aim at boosting defense and security, including cybersecurity

5G Security

Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies   5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on 5G Security

The 2021 Perspective – Challenges and Milestones for The VPN Industry

By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on The 2021 Perspective – Challenges and Milestones for The VPN Industry

A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on A Hybrid Workplace Means New Threats and More Pressure on IT Leaders

Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications

Learning Hardware Security Via Capture-The-Flag Competitions

By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Learning Hardware Security Via Capture-The-Flag Competitions

Cybersecurity Best Practices for End Users

By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Cybersecurity Best Practices for End Users

Emotet Attacks Surge in 2020, but Could Be Prevented

By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Emotet Attacks Surge in 2020, but Could Be Prevented

Data Migration Security

WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Data Migration Security

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X