Cyber teams on the brink of burning out
UK critical national infrastructure (CNI) organisations must take steps to ensure cyber leaders have the
UK critical national infrastructure (CNI) organisations must take steps to ensure cyber leaders have the
UK critical national infrastructure (CNI) organisations must take steps to ensure cyber leaders have the
What is the difference between traditional perimeter protection and converged security solutions for perimeter defences
Axon Technologies, the UAE-headquartered information security solutions provider, announced the appointment of Alain Kallas as
Qognify announced the appointment of its Director of Program Management: Professional Services. Pavithra Subramanian joins a Professional Services team
Utilities are considered a part of a country’s critical infrastructure, so how can we secure
The Oil & Gas sector is incredibly susceptible to malicious attack because it is a
Cyberattacks on critical infrastructure, combined with data theft in cloud services because of the advancement
In June 2018 the fourth Annual Upstream West Africa Summit will take place, leading to
Following the ‘NotPetya’ and ‘WannaCry’ cyberattacks on the UK’s National Health Service, as well as the recent hacking of thousands of UK parliamentary email accounts, Security News Desk Sub Editor, Francesca Seden shines a spotlight on the growing cyber threats to global critical infrastructure from terrorists and hackers and explores how further attacks might be mitigated in the future.
Copyright notice This website and its content is copyright of Security Buyer – © Hand Media International LTD 2021. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than the following: you may print or download to a local hard disk extracts for your personal and non-commercial use only you may copy the content to individual third parties for their personal use, but only if you acknowledge the website as the source of the material You may not, except with our express written permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any other website or other form of electronic retrieval system.