Featured

Markus Braendle.

Extortion Attacks On OT And IIoT Infrastructure Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack We’ve already seen extortion-driven attacks on infrastructure such as cities and ports, which history suggests will continue and spread to energy and transport infrastructure. With the introduction of Industrial Internet of Things (IIoT), manufacturing industry will become a new target. Professional cybercrime is increasingly driven by the simple psychology of extortion, while the almost limitless potential targets...

Read more
Trend Micro Research Uncovers Major Flaws In Leading IoT Protocols.

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today warned organisations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). Trend Micro’s new report, co-branded with Politecnico di Milano, The Fragility of Industrial IoT’s Data Backbone, highlights the growing threat of industrial espionage, denial-of-service and targeted attacks...

Read more
Swivel Secure Launches Updated AuthControl Mobile Version 5.

Multi-factor authentication provider, Swivel Secure, has announced the launch of its new AuthControl Mobile application, Version 5. The new update further enhances security and increased deployment agility for its users. The application has been totally rewritten to provide its users with a better performing core functionality in a even more secure system. The new version of AuthControl Mobile V5 supports several languages according to the configuration of the device, enhancing the user experience and comfort...

Read more

DomainTools, a leader in domain name and DNS-based cyber threat intelligence, recently announced the results of a survey of 1,000 UK consumers, which revealed that 20% of British consumers have been caught out by phishing emails pretending to be from a trusted, legitimate brand, but which in reality are used for malicious purposes such as the theft of PII or the installation of malware on a network. Concerningly, a further 16% of respondents to the...

Read more

2018 has been the year of digital transformation, with organisations of all sizes either implementing or planning projects in every area from customer service operations to workforce management. Every business process is being assessed and within this, print management has also experienced a shift, according to leading enterprise office solution provider, Y Soft Corporation, which believes that 2019 will see digital transformation projects disrupt print management even further. “In 2019, businesses will increasingly focus on...

Read more

Okta, Inc. (NASDAQ:OKTA), the leading independent provider of identity for the enterprise, today announced two new promotional offers that allow VMware Workspace ONE customers to easily take advantage of the Okta Identity Cloud through their local channel partner. These two offers include: Okta for VMware Workspace ONE Advanced: Workspace ONE Advanced customers who are looking to build on their VMware digital workspace capabilities for use cases such as non-employees and cloud apps can now purchase...

Read more
Image of xforce command

RIT Computing Weekend will have an extra special visitor – the new IBM X-Force Command Tactical Operation Center (C-TOC), which will be making its first visit to a university as part of the Nov. 2–4 event. IBM recently announced the C-TOC, the industry’s first fully operational Security Operations Center on wheels, capable of travelling onsite for cybersecurity training, preparedness and response. Housed in a tractor trailer, the center will visit RIT Nov. 2 before continuing...

Read more
Detect and block attacks

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the release of Netwrix Auditor for Network Devices as a part of the new Netwrix Auditor 9.7 platform. The application enables organisations to detect and investigate network security threats and is targeted at network specialists, IT administrators, IT managers and security analysts. Netwrix Auditor for Network Devices enables organisations to reduce the risk of attackers taking control...

Read more
Ciso

IT security leaders in businesses across the globe are stuck with their hands behind their backs when it comes to fighting off cybercrime. They lack influence in the boardroom and find it hard to justify the budgets they need; inevitably making their businesses more vulnerable. The phenomenon is one of the findings of a new report from Kaspersky Lab, which has found that 86% of CISOs now believe cybersecurity breaches to be inevitable, with financially...

Read more

More than eight out of ten people in Britain (83 percent) are ‘unsure’ of fintech, according to a survey of 2,000 UK consumers commissioned by TopLine Comms. Fintech companies leverage technology to offer financial services. Despite the fintech sector in the UK thriving, attracting more fintech investment than China and the US in H1 2018, the research shows UK consumers are still wary of new finance companies, and feel more comfortable using the services of...

Read more
Page 17 of 18 1 16 17 18
Social media & sharing icons powered by UltimatelySocial