Technology
Should organisations be collecting metadata?
The recently-enacted Amendment to the Telecommunications Act requires telecommunications providers to retain details of online…
Eight cyber security commandments all workers should follow
Despite the growing visibility of cyber security issues, many people still possess a relatively uninformed…
Ixia launches Vision ONE for end-to-end network visibility
Turnkey device optimises network security without sacrificing performance Ixia has launched Vision ONE. This turnkey…
Odebrecht Deploys Aconex for Panama City’s Second Metro Line
Collaboration Platform Drives Efficiency in Fast-Tracked Transportation Infrastructure Project Aconex Limited has announced that a…
IT roles are changing: how to avoid becoming obsolete due to digital disruption
The evolution of the technology driving digital disruption has the potential to make many IT…
Five BYOD disasters organisations can avoid with good planning
The ‘bring-your-own-device’ (BYOD) approach to business technology has many advantages. If done correctly, it can…
Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…
Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation
Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep…
Akamai Revolutionises Bot Management
Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of…
IBM Study Finds C-Suite and CISOs Not Aligned on How to Combat Cybercriminals
Education and Engagement Needed to Empower C-Suite for New Security Landscape IBM Security and IBM’s…
Seagate Now Shipping World’s Slimmest and Fastest 2TB Mobile Hard Drive
New Seagate Mobile HDD Empowers OEMs to Pack Ultra-High Capacity into Slim 7mm Form Factor…
Tips to secure the mobile workforce
mobile workforce is on the rise but many businesses use inadequate solutions to protect sensitive…
Dridex: Financial Trojan aggressively spread in millions of spam emails each day
A new whitepaper released by Symantec overnight observes the Dridex Trojan as the most dangerous…