Developing countries support cybersecurity: Official
The Communications and Information Ministry’s International Cooperation Center head, Ikhsan Baidirus, said developing countries had agreed to give close attention to the strengthening of...
Gemalto Wins 2017 Cybersecurity Excellence Award for Best Encryption Product with SafeNet KeySecure
Amsterdam – March 23, 2017, Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, announces that they have been named a winner of...
InterACE Showcases The Finest Cybersecurity Talent In The U.K.
Inter-ACE 2017 - Hackathons have become increasingly common in recent years, and I've written before about their growing popularity as a means by which...
5 Cybersecurity Strategies Businesses Need to Implement in 2017
Despite the prominence of cyber-attacks nationally, from politics-to-healthcare, most companies are doing little to protect themselves from hackers. According to Symantec, there were more...
Cyber Security in India: Need for an advanced framework
The world has witnessed recurrent instances of cyber attacks in the recent past. These cyber attacks have raised eyebrows on the reliability of the...
How companies can stay ahead of the cybersecurity curve
If you’re like me, on a given day you interact with a whole range of connected technologies for work and play. Just today, I...
Computer Security Disruption Tactics: Security Experts Race On To Catch The Hackers
It’s now evident there are many more hacker intrusions during which security experts struggle to repel attackers and resolve damage than we first thought....
Cybersecurity – how integrators can protect clients against risks
Previously, we looked at the different kinds of cyberattack to which networked AV systems are potentially vulnerable. Here, we offer advice on how systems...
4 cyber threats you need to be aware of in 2017
Leaks, hacks, phishing schemes, and all manner of cyber threats regularly make the headlines now. As more and more put their data online and...
FireEye Government Forum Explores New Era of Cyber Security
The threat landscape is evolving, creating new rules of engagement for federal, state and local governments.
At the same time, threat actors have become more...