In preparation of GDPR, it is vital that your business has a process in place to securely and responsibly dispose…
Browsing: Breaches
New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of businesses planning to outsource security…
Cybersecurity has dynamically evolved into a complex, ongoing threat for any company if they value their business. Cybersecurity should take…
Enterprises embracing hybrid cloud, but need better visibility and security management processes to accelerate cloud application deployment, and prevent cyberattacks…
A USB memory stick containing highly sensitive Heathrow security data, including details of the Queen’s route to the airport and her security measures,…
News broke yesterday morning that an unknown hacker hijacked Coinhive’s DNS server and replaced the legitimate Coinhive JavaScript in-browser miner with a malicious…
After a serious IT security incident is discovered, the priority is to shut it down and recover quickly in a…
A new Javelin Research study finds authentication at crossroads, password reliance continuing, and better options increasing. NuData Security commented below. Lisa…
It has been reported that the Fancy Bear hackers are racing to exploit the recently announced Adobe Flash bug. The hacking group…
As reported today by CNBC and others, the US Department of Homeland Security and the FBI issued a warning to critical…