With the ever-expanding influx of Internet Embedded Technology (IET) within businesses, such as printers, conferencing solutions, building security technology, heating,…
Browsing: Data protection
According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error.…
Nine out of 10 employees use USB devices, but only 20 percent of them are leveraging encryption POWAY, CA –…
An innovative UK first, Bournemouth is accepting digital identity app Yoti as a form of ID, allowing people to leave…
VULNERABILITY DESCRIPTION A team of researchers, including Tripwire VERT’s Craig Young has announced that TLS stacks from at least 8 different vendors are…
Research shows that, on average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware is a…
Cloud based recovery is growing at a phenomenal rate Over the past few years businesses have been buying cloud based recovery like it’s going out…
IT security experts are weighing re the new survey by HSB and Zogby this week, which finds that almost one third of US…
Hackers will exploit broader entry points In the coming year, we will see the attack surface growing and evolving as…
Security Risks Drive Growth in Overall Security Spending Gartner, Inc. forecasts worldwide security spending to total $96.3 billion in 2018,…