BLOG

What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered including: the ethics of paying ransoms, to politicised destructive attacks and the new ‘anchors’ of compute infrastructure in a remote world. Here we look at some of the key discussion points:

Read More


BLOG

The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers to a halt was borne out of a student’s bedroom in the Philippines, just over 20 years ago. Mark Nutt, EVP EMEA at Veritas, is taking a look back at when the computer virus was unleashed and the ripples it sent forward in time. Not only did “LoveBug” infect over 45 million devices, but it became a catalyst for the multi-billion-dollar ransomware crime industry that we know today.

Read More



NEWS

Remote working leads to increases in cyber attacks

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working practices brought on by COVID-19, with 65% of organisations noting they have either been breached or exposed to an attack. That’s one of the key findings from HLB’s Cybersecurity Report which launched recently.

Read More

One in four European companies would be significantly exposed in the event of a cyber-attack,...
68% of IT organisations have no to modest confidence to manage digital threats, despite a...
CyberArk has introduced new subscriptions, programs and tools designed to accelerate...
Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal...
Digital transformation pushed to the top of the priority list for central Government.
New threat intelligence from F5 Labs shows that Europe suffers more attacks from within its borders...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more