Cybersecurity

ProLock ransom note

Be wary of ProLock ransomware

Businesses must be wary of ProLock ransomware and its faulty decryptor, according to SophosLabs recent research for the security industry
Five Ways Converged Security Benefits

Five ways ‘converged’ security benefits your business and your customers

Security systems used to be stand-alone, they were built to work in an independent and self-contained way, not converged security benefits.
social media

Twitter reveals true extent of hack

Twitter has revealed the true extent of this week’s large-scale cyber-attack that saw the accounts of multiple celebrities compromised. 
trends

Mind the gap: upskilling cyber security teams

Mind the gap: upskilling cyber security teams is an article written by Matt Cable, VP Solutions Architects & MD Europe, Certes Networks
Cisco Webex Meetings

Cisco Webex Meetings flaw?

A new vulnerability found in the Cisco Webex Meetings client for Windows could allow local authenticated attackers to gain access to sensitive information
COVID-19’s first wave of cybersecurity

COVID-19’s first wave of cybersecurity

David Grey, Senior Manager, NTT, analyses NTT’s 2020 First Wave Global Threat Intelligence Report when cybersecurity risks are at their highest
5G: Computer virus or human virus?

5G: Computer virus or human virus?

new conspiracy theories surrounding the emerging 5G network have come to light. This article debunks these theories and analyses cyber security concerns
Malware Detection

Qualys adds Malware Detection

Qualys, cloud-based IT, security and compliance solutions,  announced it has added malware detection to its cloud-based Remote Endpoint Protection offer
DDos A1Networks

Key Findings of A10 Networks’ Q4 2019 DDoS Weapons Report

A10 Networks recently published a report on the current DDoS landscape including the methods hackers are using to maximise the damage they inflict.
Utilities logo

Synectics awarded critical-infrastructure contract

Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security
Scroll to Top