off

“Legacy applications pose serious cyber security risks to hospitals” warns BridgeHead Software

A new White Paper entitled: ‘Legacy Applications: A Healthcare Cyber Security Nightmare’ has been co-authored by clinical and cyber security consultancy AbedGraham and healthcare data management specialist BridgeHead Software. The document explores the far-reaching...
Posted On 04 Mar 2019
Anthony Perridge
off

Four Reasons Why CISOs Should Adopt The A.R.T. of Cyber Threat Intelligence

For today’s modern organisations, data has never been so valuable but, sadly, it’s also a valuable commodity for cyber criminals, asserts Anthony Perridge. The data held within your organisation is now more dynamic than ever. However, the bad news is that this truism...
Posted On 21 Feb 2019
off

Malwarebytes study reveals 80% rise in malware detections targeting businesses

Malwarebytes, the advanced endpoint protection and remediation solutions developer, has published its third annual State of Malware Report which analyses the top malware threats from January until November 2018 and compares them with the same period in 2017. The report identifies...
Posted On 24 Jan 2019
off

Botnets and Machine Learning: A Story of ‘Hide and Seek’

Botnets have been a major issue in the cyber security industry. As techniques to stop them have come into play, so the bots have evolved ways of navigating their way around these solutions. Leonidas Plagakis explains why machine learning may be the industry’s best chance of...
Posted On 23 Jan 2019
off

“Almost half of companies still unable to detect IoT device breaches” reveals Gemalto study

Gemalto, the digital security specialist, has revealed that only around half (48%) of businesses can detect whether or not any of their Internet of Things (IoT) devices suffers a breach. This news comes despite companies having an increased focus on IoT security. Spending on...
Posted On 15 Jan 2019
Figure 1
off

Cyber criminals “using fake fonts” to evade detection and steal banking details

Proofpoint’s cyber security researchers have discovered cyber criminals using fake fonts in phishing web pages, allowing these pages to evade detection by unsuspecting victims, security vendors and affected organisations. This unique technique, observed for the first time,...
Posted On 08 Jan 2019
off

Video applications specialist barox actively promotes high-security for networks

barox (the manufacturer of professional standard switches, media converters and IP extenders specifically designed for video applications) is promoting sophisticated personalised encryption techniques to provide important safeguards for protecting sensitive data networks. When...
Posted On 17 Dec 2018
off

PandaLabs issues Annual Report and outlines cyber predictions for 2019

2017 was the year when the word ransomware stopped being a term exclusive to cyber security experts and IT departments. The enormous media attention that attacks such as WannaCry and Petya/GoldenEye received turned this type of threat into one of the key trends for businesses...
Posted On 17 Dec 2018
Ian Livsey: CEO at the IRM
off

Webinar on Digitalisation: ‘The 4th Industrial Revolution for Risk Management’

Cyber attacks and data breaches are among the foremost threats facing any business. Indeed, the mainstream news is constantly highlighting global organisations (including well-known and trusted names) that have suffered attacks at the hands of cyber criminals. These attacks can...
Posted On 10 Dec 2018
Jon Fielding
off

Apricorn, Rapid7 and Blueliv business leaders outline security predictions for 2019

Jon Fielding (managing director for EMEA at Apricorn), Sam Humphries (senior product marketing manager for global markets and compliance with Rapid7), Deral Heiland (Internet of Things research lead at Rapid7) and Jose Miguel Esparza (head of threat intelligence at Blueliv) have...
Posted On 27 Nov 2018