Is Your Cybersecurity Team Keeping Up With The Volume of Attacks?
In the words of former Cisco CEO John Chambers, “there are two types of companies: those who have been hacked, and those who don’t...
WiCyS 2017 Addresses Skills, Gender Gap in Cybersecurity Industry
The cybersecurity skills gap continues to grow, despite recent efforts to drive change. With Frost & Sullivan estimating 1.8 million open and unfilled cybersecurity...
Developing countries support cybersecurity: Official
The Communications and Information Ministry’s International Cooperation Center head, Ikhsan Baidirus, said developing countries had agreed to give close attention to the strengthening of...
Gemalto Wins 2017 Cybersecurity Excellence Award for Best Encryption Product with SafeNet KeySecure
Amsterdam – March 23, 2017, Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, announces that they have been named a winner of...
InterACE Showcases The Finest Cybersecurity Talent In The U.K.
Inter-ACE 2017 - Hackathons have become increasingly common in recent years, and I've written before about their growing popularity as a means by which...
5 Cybersecurity Strategies Businesses Need to Implement in 2017
Despite the prominence of cyber-attacks nationally, from politics-to-healthcare, most companies are doing little to protect themselves from hackers. According to Symantec, there were more...
Cyber Security in India: Need for an advanced framework
The world has witnessed recurrent instances of cyber attacks in the recent past. These cyber attacks have raised eyebrows on the reliability of the...
How companies can stay ahead of the cybersecurity curve
If you’re like me, on a given day you interact with a whole range of connected technologies for work and play. Just today, I...
Computer Security Disruption Tactics: Security Experts Race On To Catch The Hackers
It’s now evident there are many more hacker intrusions during which security experts struggle to repel attackers and resolve damage than we first thought....
Cybersecurity – how integrators can protect clients against risks
Previously, we looked at the different kinds of cyberattack to which networked AV systems are potentially vulnerable. Here, we offer advice on how systems...

















