A new spyware framework that allows the government to implant remote beacon and loader capabilities on target computers from Windows…
Browsing: Strategy and Planning
Dear Editor, It is time for organisations to bury dedicated Hardware-based Security solutions. Recent years have seen a fundamental transformation…
MELVILLE, N.Y, LONDON, UK – The personal data held by local authorities for over 3.5m people in the UK is…
In response to new reports of WannaCry 2.0? New ransomware variant without kill switch emerges, Gabriel Gumbs, VP of Product Strategy at STEALTHbits Technologies commented…
For those of us in the IT Security profession, Friday May 12 was Black Friday. Networks in healthcare and critical…
Following the News that hospitals across England have been hit by a large scale cyber-attack. Hospitals across the country appear to…
Businesses around the world are upgrading the way they manage their information, moving from records and information management (RIM) to…
Following the News that Donald Trump has signed an executive order on cybersecurity, that makes clear that agency heads will be held accountable for…
It was around this time last year that SWIFT members started making major headlines regarding security breaches. The $81 million…
Following President Trump’s firing of FBI Director Comey, Leo Taddeo, CISO of Cyxtera Technologies provides an insight on the effects this…