Sophos introduces lateral movement protection to XG Firewall to stop advancing cyberattacks
Sophos, a provider in network and endpoint security, announced that its next-generation Sophos XG Firewall
Sophos, a provider in network and endpoint security, announced that its next-generation Sophos XG Firewall
Vectra, the leader in automating the hunt for in-progress cyber attacks, today announced it has been issued five U.S. patents, numbers for advanced cyber security analytics capabilities automated by artificial intelligence (AI). These patents are said to demonstrate the effectiveness of security research and data science collaborating to enhance visibility into attacker behaviour.
Russia’s alleged undermining of the recent US election by cyber-tampering raises questions about the security of democratic systems and their susceptibility to corruption. It also highlights the power and behaviour of corrupt systems. Nick Kochan discusses.
Telecoms giant BT and the Cyber Security Challenge UK staged a mock investigation into a cyber-attack at London’s iconic BT Tower in a bid to find the country’s best hidden cyber security talent.
Paul German insists it is time to face up to the futility of breach detection and protection alone, and that organisations must make a change to avoid the fate of the organisations that have recently hit the hacking headlines. Too many companies are being breached; and governments globally are recognising the need to invest heavily to protect vital services and infrastructure.
Cyber attacks on Sony and nuclear power plants in South Korea have served to highlight the dangers facing many sectors including finance and banking.
Imprima offers an insight into hacking worldwide: covering the cost to the global economy, highlighting famous hacking scandals and high-profile hackers.
A Kapersky Lab report has shed light on the ‘Darkhotels’ threat. The report suggests hackers have been accessing high profile guests via hotel WiFi.
Cyber criminals fully realise that companies tend to be minimally staffed during the holidays. Be proactive this year and hunt for adversaries.
With increased risk of phone hackers stealing sensitive information via untraceable cyber attacks on VOIP solutions Reeds adopt SIP Encrypt from VoIP.co.uk.
Copyright notice This website and its content is copyright of Security Buyer – © Hand Media International LTD 2021. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than the following: you may print or download to a local hard disk extracts for your personal and non-commercial use only you may copy the content to individual third parties for their personal use, but only if you acknowledge the website as the source of the material You may not, except with our express written permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any other website or other form of electronic retrieval system.