Podcast Podcast | June 15, 2021 Episode 266 – Disrupting Dangerous Malware – Microsoft’s legal action to disrupt Trickbot Interview with Mary Jo Schrade, Assistant General Counsel and Regional Lead for Microsoft’s Digital Crimes Unit (DCU) Asia. Your browser does not support the audio element. Download Now Read More Case Studies Case Studies | Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | Top Carousel | November 20, 2018 Bitglass 2018 BYOD Report: More Than Half of Companies See Rise in Mobile Security Threats 43 Percent of Firms Do Not Know if Devices Accessing Corporate Data Have Downloaded Malware Bitglass has released its 2018… Read More Communication Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Security | Technology | August 1, 2018 Mimecast announces acquisition of Solebit Acquisition offers enhanced protection against advanced cyberattacks, zero-day threats and malware Mimecast Limited has announced it has acquired security software developer… Read More Uncategorized Uncategorized | August 19, 2014 The dangers posed by ‘Syrian’ malware The geopolitical conflicts of the Middle East have deepened in the last few years, particularly in relation to Syria. The… Read More Cyber Security Cyber Security | July 25, 2014 Ransomware goes to Tor: Potential successor to Cryptolocker appears Encrypting ransomware – a type of malware which encrypts user data and then demands ransom for decryption – is now… Read More × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Case Studies Case Studies | Cyber Security | Information | Movers & Shakers | Reports | Security | Technology | Top Carousel | November 20, 2018 Bitglass 2018 BYOD Report: More Than Half of Companies See Rise in Mobile Security Threats 43 Percent of Firms Do Not Know if Devices Accessing Corporate Data Have Downloaded Malware Bitglass has released its 2018… Read More Communication Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Security | Technology | August 1, 2018 Mimecast announces acquisition of Solebit Acquisition offers enhanced protection against advanced cyberattacks, zero-day threats and malware Mimecast Limited has announced it has acquired security software developer… Read More Uncategorized Uncategorized | August 19, 2014 The dangers posed by ‘Syrian’ malware The geopolitical conflicts of the Middle East have deepened in the last few years, particularly in relation to Syria. The… Read More Cyber Security Cyber Security | July 25, 2014 Ransomware goes to Tor: Potential successor to Cryptolocker appears Encrypting ransomware – a type of malware which encrypts user data and then demands ransom for decryption – is now… Read More
Communication Communication | Cyber Security | Data Centres | Information | Movers & Shakers | Security | Technology | August 1, 2018 Mimecast announces acquisition of Solebit Acquisition offers enhanced protection against advanced cyberattacks, zero-day threats and malware Mimecast Limited has announced it has acquired security software developer… Read More Uncategorized Uncategorized | August 19, 2014 The dangers posed by ‘Syrian’ malware The geopolitical conflicts of the Middle East have deepened in the last few years, particularly in relation to Syria. The… Read More Cyber Security Cyber Security | July 25, 2014 Ransomware goes to Tor: Potential successor to Cryptolocker appears Encrypting ransomware – a type of malware which encrypts user data and then demands ransom for decryption – is now… Read More
Uncategorized Uncategorized | August 19, 2014 The dangers posed by ‘Syrian’ malware The geopolitical conflicts of the Middle East have deepened in the last few years, particularly in relation to Syria. The… Read More Cyber Security Cyber Security | July 25, 2014 Ransomware goes to Tor: Potential successor to Cryptolocker appears Encrypting ransomware – a type of malware which encrypts user data and then demands ransom for decryption – is now… Read More
Cyber Security Cyber Security | July 25, 2014 Ransomware goes to Tor: Potential successor to Cryptolocker appears Encrypting ransomware – a type of malware which encrypts user data and then demands ransom for decryption – is now… Read More