Archive for April, 2016

What CISOs want in 2016

Friday, 29 April, 2016 | X

  What CISOs want in 2016 The role of the Chief Information Security Officer (CISO) has developed rapidly over recent…

New Service Hunts Malicious Domain Names

Friday, 29 April, 2016 | X

  Information security firm High-Tech Bridge has launched a new free service to help web site owners and businesses understand…

image

DoD Launches ‘Hack the Marine Corps’ Bug Bounty Program

Tuesday, 14 August, 2018 In General News, Top News

The U.S. Department of Defense on Monday announced the launch of “Hack the Marine Corps,” the organization’s sixth bug bounty…

Protect your Customer and Employee Accounts

Tuesday, 7 August, 2018 In Featured News, General News, Top News

  Find our more about Digital Shadows overview please click here

European workers showing security fatigue

Tuesday, 7 August, 2018 In Featured News, General News, Top News

Despite being fully aware of security risks following the introduction of high-profile legislation like GDPR, European workers have the worst…

How Bitcoin and the Dark Web hide SamSam in plain sight

Tuesday, 7 August, 2018 In General News, Other News

For two and a half years someone has been terrorising organisations by breaking in to their networks and infecting their…

The Importance of Access Control for IoT Devices

Tuesday, 7 August, 2018 In Featured News, General News

With the Right Safeguards in Place, IoT Devices Don’t Have to be Your Network’s Weakest Link Cybercriminals are actively increasing…

image
Latest Videos
Polls
Sorry no Polls available - check back soon