Lateral phishing: The latest in email account takeover
"One of the most striking aspects of this emerging attack is the scale of potential victims that the attackers target."
Whitepaper: Setting up syslog-ng storage in Elasticsearch
Whitepaper: Using syslog-ng’s pattern database to analyse log messages
Case Study: Education provider streamlines compute, network systems with HiveIO
Protecting remote staff from phishing attacks – WatchGuard
Report: Using UEBA to increase security analytics effectiveness
Who is really responsible for cloud security?
UK privacy watchdog 'deeply concerned' about live facial recognition
UK Information Commissioner Elizabeth Denham says she is deeply concerned about the rollout of LFR.
HCL Technologies closes acquisition of IBM products
Company launches HCL Software business unit to operate the enterprise software offerings.
Rapid increase in AI to detect fraud
"Criminals are finding new ways to exploit technology to commit schemes and target victims."
10 times malware proved that MacOS isn't bulletproof
Mac users need to come to terms with the fact that their devices are not immune from attack.
Financial organisations plagued by spear phishing attacks
Finance department employees are most heavily targeted by these attacks, because they are most likely to deal with banks and other financial institutions.
BlackBerry launches new threat hunting solution
CylanceGUARD is a subscription-based offering that validates, triages, analyses, prioritises, and automates analyst and incident engagement.
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
How to stop your data from getting hijacked - SolarWinds
Organisations often struggle to avoid man-in-the-middle attacks because hackers target infrastructure the organisation has almost no control over.
Protecting organisations from insider threats - Bitglass
The biggest challenge for most external threat actors is gaining access to a target organisation, but insider threats already have this.
Global banks fail to keep up with application security
One bank had an unpatched vulnerability that has existed since at least 2011.
Why 5G and AI will determine cybersecurity strategy for the next decade
"We all stand on the threshold of a new era of cybercrime."
Thailand leads ASEAN into a secure digital future
As the chair country of ASEAN, Thailand aims to advance the community towards a future that includes a digital ASEAN.
One Identity solution achieves new SAP certification
Customers can benefit from improved interoperability with SAP applications and with the large ecosystem of solutions that run on SAP NetWeaver.
Bitdefender advances endpoint security solution for SecOps teams
“Rather than rely on a pure prevention or pure detection/response model, the most secure organisations will weave in strong prevention and speedy detection/response with integrated risk analytics.”
Probax launches Dropbox backup solution for MSPs
The solution gives businesses a backup of their Dropbox data and extends the retention of data beyond the native data recovery limits of Dropbox.
Trend Micro delivers network security with AWS
Trend Micro Cloud Network Protection, available today, will be listed on AWS Marketplace.
Cybersecurity market increasingly competitive as public cloud segment grows
Cybersecurity solutions for public cloud and ‘as a service’ offerings are continuing to grow, however traditional hardware and software deployments still dominate the market.
Financial institutions' websites most frequently attacked – report
Positive Technologies found that the majority of all web attacks in 2018 targeted sites of financial institutions, transportation companies, hospitality and entertainment companies.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.
UPDATED: Orvibo & Arlo smart home products patched to prevent attacks
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Amazon admits storing Alexa recordings until users take action
Amazon’s Alexa voice service is storing all user voice recordings and transcripts on its servers by default – and people who want to delete those recordings must do so manually.
Wandera reports on the state of mobile security in financial services
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
Huawei working to patch critical security vulnerabilities
Huawei is proactively working with Swascan researchers to fix the vulnerabilities, which could affect three main areas: confidentiality, integrity, and availability.
Report: Why vulnerability assessment is the first step in security strategy
Tenable’s latest research examines real-world vulnerability assessment practices at 2,100 organisations to see how they’re approaching cyber hygiene.
Whitepaper: Measuring SIEM’s ability to create actionable defence
Many organisations are struggling to keep pace with the speed in which hackers are attacking their system.