More Protective Security Content – Page 13
-
NewsPhilippine national security and criminal cases ‘put at risk’ by data leak
A data store belonging to The Solicitor General of the Philippines containing 345,000 files and documents was downloaded by a third party, with the information left available on the web, according to cyber security company TurgenSec.
-
ebook6 Questions to ask about any BaaS
To find the right BaaS solution, you need to ask the right questions.
-
ebookA Guide from Virtru: How to Create a Sustainable Cybersecurity Strategy
As organizations embrace digital transformation, businesses are collecting, processing and storing larger quantities of data than ever before.
-
BlogThe journey to automation
Cyber security defence strategies are too often reliant on manual processes - this needs to change as we enter the age of AI, argues Jan Tietze
-
WebinarRecovering Fast from Ransomware attacks
Ransomware has been blasting news feeds on a daily basis for years. Each article details the story of an organisation that can no longer access their business critical data.
-
NewsCloud security switch will increase cyber security spending to $200 billion a year by 2024, says BI
The switch to cloud security will increase global cyber security spending to $200 billion a year by 2024, according to a new report by Bloomberg Intelligence (BI)
-
NewsEnergy industry provider Gyrodata hit by data breach
Global energy industry service provider Gyrodata this week began sending letters to current and former employees whose information may have been compromised in a ransomware attack.
-
NewsEU to establish Cybersecurity Competence Centre in Bucharest
The European Union will seek to boost security of the internet and other critical network and information systems by setting up a Cybersecurity Competence Centre in the Romanian capital of Bucharest.
-
BlogDriving cloud security from the edge for post-COVID success
Investments in cloud infrastructure have helped companies survive a potentially catastrophic period in the pandemic. Now it’s time to look at boosting security from the edge, argues David Shepherd.
-
WebinarMaking the most of multi-cloud Backup as a Service: Nine things to consider
Ask anyone how much they love backup and you get the same response. Laughter. It doesn’t have to be like that, especially if you’re looking for the right solution to handle your on-premises and public cloud IT environments.
-
NewsGiant US insurer warns breach leaked customers’ driving license numbers
Major US car insurer Geico has sent a letter to policy holders to tell them of a hack which exposed their driver’s licence number to cyber-attackers.
-
NewsInvestigation under way after hack at provider of code testing software
Codecov has called in law enforcement agencies after a cyber attacker breached one of its products which enables software developers to test source code to help prevent bugs and syntax errors.
-
NewsIndian online stockbroker Upstox enhances security after suspected data breach
Upstox, India’s second largest stockbroker, has upgraded its security systems after receiving emails claiming unauthorised access into the company’s database.
-
NewsDoS and API attacks ‘on the rise’
New analysis from F5 Labs suggests Denial-of-Service (DoS) and Application Programming Interface (API) attacks, are on the rise globally.
-
NewsMicrosoft warns businesses are not taking firmware attack threat seriously enough
Businesses are not paying close enough attention to firmware attacks, Microsoft has warned, following research showing the scale of the problem.
-
NewsEU says ‘no major breach detected so far’ following significant cyber attack
The European Commission and other European Union (EU) institutions have been hit by a cyber attack significant enough for senior officials to be alerted.
-
NewsThousands of Indian government officials being trained in cyber security
More than 4,000 employees of the Indian government have been trained in cyber safety in the past three months to help beef up the state’s defences against cyber-attacks.
-
VideoThe Financial Services Guide to Reducing Data Security Risks
Real-time sales and marketing activities benefit from holistic views of customer activity, but this comes with the heightened risk of sharing sensitive financial and personal information both within and outside of the organization.
-
VideoBuilding Inclusive Security Teams
Diversity can sometimes be referred to as the ‘what’ while inclusion focuses on the ‘how’. In this session we look at how you can measure and benchmark your culture to enable diversity to thrive.
-
VideoCreating a Cyber Security Culture
Peter Drucker famously said “culture eats strategy for breakfast”.


