Archive for April, 2016

What CISOs want in 2016

Friday, 29 April, 2016 | X

  What CISOs want in 2016 The role of the Chief Information Security Officer (CISO) has developed rapidly over recent…

New Service Hunts Malicious Domain Names

Friday, 29 April, 2016 | X

  Information security firm High-Tech Bridge has launched a new free service to help web site owners and businesses understand…

image

Most Profiles Likely Scraped by Third Parties

Friday, 6 April, 2018 In Featured News, General News

Facebook announces plans to restrict data access after 87 million users’ data was improperly shared with Cambridge Analytica. Data belonging…

How to Build a Cybersecurity Incident Response Plan

Friday, 6 April, 2018 In General News, Other News

Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and…

Combating seven common threat techniques in 2018

Friday, 6 April, 2018 In Editorial, General News

By Keiron Shepherd, Senior Security Specialist, F5 Networks¬† With automated tools and hackers for hire, cybercrime has turned into a…

780 Days in the Life of a Computer Worm

Wednesday, 28 March, 2018 In Featured News, General News

This is a story of a worm, from the time it was coded and deployed onto the Internet. It is…

Getting Ahead of Internet of Things Security in the …

Wednesday, 28 March, 2018 In Editorial, Featured News, General News

In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all…

image
Latest Videos
Polls
Sorry no Polls available - check back soon