Featured

Securing Crypto Assets On The Blockchain.

By Andre Stoorvogel, Director of Product Marketing, Rambus Payments The rapid expansion of the cryptocurrency ecosystem demonstrates the power of the blockchain to revolutionize financial services and beyond. Yet at the same time, the inherent volatility provides a cautionary tale. With blockchain implementations gaining traction, it is clear that a new approach is required to enhance the security and usability of crypto and digital assets. But how can this be achieved? A token gesture or...

Read more
nCipher: New Digital Initiatives, IoT And Cloud Adoption Driving The Use Of Trusted Cryptography Revealed By 2019 Global Encryption Trends Study.

nCipher Security, the provider of trust, integrity and control for business critical information and applications, announces that as organizations embrace the cloud and new digital initiatives such as the internet of things (IoT), blockchain and digital payments the use of trusted cryptography to protect their applications and sensitive information is at an all-time high, according to the 2019 Global Encryption Trends Study from the Ponemon Institute. With corporate data breaches making the headlines on an...

Read more
Threat Intelligence Group Completes Global Expansion.

Cyber security company Foregenix has expanded its Threat Intelligence Group (TIG) in the Asia-Pacific region with the establishment of a new base in Melbourne, Australia. The move will enable the Wiltshire headquartered firm, which has offices in Europe, Africa, SE Asia and North and South America as well as an established base in Sydney, to offer TIG services globally and around the clock in a follow-the-sun fashion. The TIG provides real-time endpoint monitoring in support...

Read more
Lack Of Skills Is Leading Cause Of The Information Security ‘Talent Gap’, According To Latest Infosecurity Europe Poll.

A lack of skills is cited as the biggest challenge to recruiting cyber and information security talent by almost a third (30 per cent) of respondents to a social media poll conducted by Infosecurity Europe 2019 – Europe’s number one information security event. This is followed by lack of recruitment budget (27 per cent) and lack of interest in careers within the sector (26 per cent). More than half (52 per cent) believe the skills...

Read more
GlobalPlatform And The Trusted Platform Association Collaborate On Trusted IoT.

GlobalPlatform, the standard for secure digital services and devices, has signed a memorandum of understanding (MoU) with the Trusted Platform Association, an organization which brings together Russian cybersecurity companies to create a collaborative internet of things (IoT) ecosystem that meets diverse market needs with flexible security. The joint work initiative will focus on aligning GlobalPlatform’s specifications, which standardize the secure management of digital services and devices, with existing Russian requirements and regulations. This harmonization of...

Read more
The Biometric Smart Card: Connecting The Digitally Excluded.

By Stan Swearingen, CEO of IDEX Biometrics Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m people in the UK lack the basic digital skills they need to use the internet effectively. And 4.8m people never...

Read more
IoT And DDoS Attacks: A Match Made In Heaven.

Written by Adrian Taylor, Regional VP of Sales for A10 Networks By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At the same time, DDoS attacks are on the rise, with Cisco estimating that the number of DDoS attacks exceeding 1 gigabit of traffic per second will soar to 3.1 million by 2021. While correlation does not equal causation, in this case I believe that the two are connected. There...

Read more
Things To Know Before Developing Intelligence Requirements.

Written by Mike Mimoso, Editorial Director, Flashpoint To state the obvious, proper intelligence requirements must be in place before data collection, analysis, and consumption of intel can happen. These requirements are critical because they enable an organisation to choose and prioritise its intelligence goals, determine what information it needs to collect and from what sources to achieve those goals, establish how it will process this information, and identify which dissemination methods are most appropriate for...

Read more
Malware And Malicious Insiders Accounted For One-Third Of All Cybercrime Costs Last Year, According To Report From Accenture And Ponemon Institute.

The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture (NYSE: ACN) and the Ponemon Institute. Based on interviews with more than 2,600 security and information technology (IT) professionals at 355 organisations worldwide, Accenture’s 2019 "Cost of Cybercrime Study" found that the cost to companies due to malware increased 11 percent, to more than...

Read more
International Women’s Day: Tales From The Cybersecurity Frontline.

A gender balanced working world is both a women’s and business issue. This International Women’s Day the #BalanceforBetter campaign should strike a chord with security professionals worldwide. It is currently estimated that women make up only a fifth of global IT security professionals, despite the well documented and growing cyber skills shortage, which is expected to reach 3.5 million by 2021. The women working in cybersecurity today are facing gender-based challenges. However, all these women...

Read more
Page 8 of 15 1 7 8 9 15