2018 Thales Healthcare Data Threat Report reveals pressures to drive digital transformation, while maintaining the security of sensitive information …
Browsing: Endpoint security
Unreliable VPNs highlight the dangers of remote working A study by OneLogin, the identity management provider bringing speed and security…
Avast experiment demonstrates consumer IoT devices and smartphones unlawfully used for mining Cryptocoins At Mobile World Congress 2018, Avast, the…
Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks commented below on SWIFT/Russian central bank. Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks:…
In recent years, the mobile workforce has grown rapidly. Many forward-thinking companies have recognized the benefits of remote work and…
We live in a world where connectivity is key. It’s brought conveniences to our personal lives, and organizations are adopting…
Check Point Announces Infinity Total Protection, a Unique New Security Model to Prevent ‘Gen V’ Threats and Attacks Game-changing new…
Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an…
Mobile app flaws could compromise industrial network infrastructure Seattle, Wash. -IOActive, Inc., the worldwide leader in research-driven security services, and Embedi, a cybersecurity…
Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more…