DDoS attacks: is the worst yet to come?
Distributed denial of service (DDoS) attacks have skyrocketed in 2017, but is the worst yet to come?
Robin Schmitt | 08 Nov | Read more
Distributed denial of service (DDoS) attacks have skyrocketed in 2017, but is the worst yet to come?
Robin Schmitt | 08 Nov | Read more
New findings from a report that Carbon Black has just released show it is easier than ever for criminals to extort money from victims through ransomware.
Mike Viscuso | 08 Nov | Read more
Blockchain is the number-one trend worldwide. Still, there is a lack of understanding of this technology among regular people, as they are used to considering it from the perspective of cryptocurrency.
Mary Ann Callahan | 07 Nov | Read more
In July this year, it was discovered that Medicare card details were being sold for less than $30 each on the dark web
Kevin Griffen | 03 Nov | Read more
Data breaches continue to devastate organisations, and the threat from insiders, whether malicious or accidental, continues to grow as the value and volume of data grows.
Tim Macdermid | 01 Nov | Read more
Hackers are suffering from an image problem. Often thought of as anti-social geeks, hidden away in basements, the reality of modern hackers paints a different picture.
Graeme Pyper | 31 Oct | Read more
With the number of serious cyber threats on the rise, many businesses are evaluating the benefits of having a dedicated security operations centre (SOC).
James Carder | 31 Oct | Read more
With the recent news of huge conglomerates such as HBO and Equifax suffering from cyber attacks, companies are heavily arming themselves against the threat of a hack
Jason Edelstein | 30 Oct | Read more
We all remember how much fun it was to build stuff with Lego blocks, right? Imagine how much more fun it would be if the blocks could duplicate themselves whenever you wanted, and if they were programmed so that you could quickly construct, say, an ocean liner, then deconstruct it at the touch of a button and turn it into a skyscraper.
Paul Haverfield | 30 Oct | Read more
The rise of artificial intelligence (AI) is the great story of our time, thanks to the low cost of computing, storage, and off-the-shelf machine algorithms.
Manish Bahl | 30 Oct | Read more
With large-scale cyber attacks becoming increasingly common, having an effective defence strategy in place has never been more important.
Chris Hodson | 30 Oct | Read more
The fallout from the Equifax hack that affected 145.5 million people can provide valuable lessons to prevent similar incidents before they happen, both by Equifax itself and the industry at large.
Lisa Froelings | 25 Oct | Read more
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
Jon McGettigan | 23 Oct | Read more
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Garrett O’Hara | 11 Oct | Read more
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
Lisa Froelings | 10 Oct | Read more
While the world has been holding its collective breath over North Korea's highly visible rocket flights and nuclear threats, the rogue nation has been carrying out a stealth campaign that threatens even worse mayhem.
Eric O’Neill | 09 Oct | Read more
When you think of the phrase “cyber security”, pet insurance doesn’t typically come to mind. After all, what have cats and dogs got to do with digital data?
Richard Laycock | 29 Sep | Read more
When facing today’s advanced threat landscape, in-depth layered defence has long been best practice.
Arabella Hallawell | 29 Sep | Read more
During the past six months, the Carbon Black Threat Analysis Unit (TAU) analysed more than 1,000 ransomware samples, categorising them into 150 families, and found attackers are looking to make quick, easy money with unsophisticated malware, combined with sophisticated delivery methods.
Brian Baskin | 26 Sep | Read more
For many years, IT departments and their infrastructures were managed under a strict command-and-control structure. This situation is now rapidly changing, and CIOs need to change with it.
Sean Kopelke | 26 Sep | Read more