Trending

Heat Index

Posts Tagged ‘Threat’

Most Recent
 
Read More
May 23, 2018

More than one-third of companies employ managed security services to hunt cyber threats

Alert Logic, the provider of Security-as-a-Service solutions, announced data from Crowd Research Partners’ 2018 Threat Hunting Report that shows 84% of companies agree that threat hunting should be a top security initiative, yet 76% believe their Security Operations Centres (SOCs)

175
 
Read More
May 17, 2018

Cancer diagnostics company uses CylancePROTECT® to safeguard patient information

Cylance Inc., the company that revolutionised endpoint security with true AI powered threat prevention, today announced that VolitionRx Limited, a cancer diagnostic company, has implemented CylancePROTECT to prevent malicious activity targeting endpoint devices before it can endanger sensitive patient information.

200
 
Read More
February 13, 2018

Mitigating IoT transduction attacks

There are serious risks to modern-day sensors through “transduction attacks” according to research conducted jointly by Kevin Fu from the University of Michigan, and Wenyuan Xu from Zhejiang University. The vulnerability could result in real-world problems for those that use devices equipped with sensors.

660
 
Read More
September 28, 2017

Masergy creates new detection and response tool with integrated Network Visibility

Masergy, a provider of global software defined networking, managed security and cloud communications solutions, announced the release of its new Network Visibility Tool. Bundled with the Masergy Managed Detection and Response service, the new tool leverages Netflow data, Active Directory,

185
 
Read More
September 15, 2017

Evaluating your IT risk – how and why

Ensuring complete protection against cyber criminals can be a virtually impossible task, but organisations can give themselves the best chance of avoiding an attack by performing regular IT risk assessments. The current threat landscape is a turbulent one and assessing risk management processes to ensure they address an organisations specific challenges should be a priority.

245
 
Read More
September 11, 2017

Israel’s CYBONET launches comprehensive cyber security solution for SMEs

CYBONET, an international information security solutions provider headquartered in Israel, has announced the release of its newest cyber security solution, Cybowall, a threat detection and response platform engineered for small and medium sized enterprises (SMEs).

265
 
Read More
July 21, 2017

Skyhigh Networks reveals sophisticated cyber attack campaign on enterprise Office 365 users

Skyhigh Networks, the provider of Cloud Access Security Broker (CASB) platform, announced it has detected and remediated one of the first examples of an operationalised cloud-to-cloud threat in the enterprise. Attackers used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts.

255
 
Read More
July 19, 2017

Securing the IoT against cyber attack

The Internet of Things is perhaps the most significant IT revolution of our time in terms of it’s potential to change the way we do everything – from working to shopping.

280
 
Read More
June 1, 2017

Telcos: when it comes to IoT security, prevention is always better than cure

Smart devices have arguably made consumers’ lives easier, and as they become more affordable, more of us are investing in the IoT. However, all too often, these smart devices are being manufactured with affordability in mind and security as an afterthought.

350
 
Read More
April 21, 2017

IoT: Lack of standards becoming a threat

According to Gartner, a total of 8.4 billion people and devices will be connected to the Internet of Things (IoT) this year. Despite the increasing popularity of IoT solutions in companies, 63% of applications are actually linked to the consumer sector.

2335

IoT LIFE LESSONS.

 
Read More
820

FEATURED VIDEOS

 
Partnering is the key to move IoT beyond connectivity. Interview with GSMA
 
 
 
 

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close