<
>

Posts in Taxonomies

Ixia, a Keysight Business, Releases 2019 Security Report Highlighting Ongoing Security Risks from Historic Vulnerabilities and Network Complexity

Keysight Technologies, Inc., a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced that Ixia, a...

Digital clutter leaves businesses exposed and employee fridges could explain why

The global report “Sorting out digital clutter in business” from Kaspersky Lab found a number of correlations between the creation of digital clutter at work and human habits behind...
Taxonomy: Cyber Safety

Acronis Grants Developers Early Access to the Acronis Cyber Platform

Acronis, a global leader in cyber protection, announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded...
Taxonomy: Cyber Safety

Function X Trading Pairs Launch on Bittrex International

Function X, a revolutionary blockchain ecosystem empowering XPhone, the world's first blockchain phone and XPOS devices developed by Pundi X Labs, is now listed on Bittrex International, the...
Taxonomy: Cryptocurrency

ORGANISATIONS IN MALAYSIA URGED TO ABANDON REACTIVE CYBER-SECURITY POSTURE

FORTINET, a leader in broad, integrated and automated cyber-security solutions, advised organisations in Malaysia to switch to a proactive approach in their networking and security strategies as...
Taxonomy: Cyber Safety

More than 312,000 cloud server honeypots in Singapore attacked within 49 minutes

Sophos has announced the findings of its report, Exposed: Cyberattacks on Cloud Honeypots, which reveals that cybercriminals attempted to login to more than 312,000 cloud server hotpots in...
Taxonomy: Cloud Security

Malwarebytes Webinar: You Got Breached. Now What? Are You Secure in Your Security Strategy?

Two painful truths about modern cyber threats. One is that no one can guarantee they can prevent 100% of all attacks from being successful. Second is that when malware gets through, it often stays...

CyberSecurity Asean security alert on Multiple Vulnerabilities in Juniper Junos OS Could Allow for Remote Code Execution (2019-04)

This alert is originally published and can be viewed at https://www.cisecurity.org   OVERVIEW: Multiple vulnerabilities have been discovered in Juniper Junos OS, the most severe of...

Malaysia consumers demand greater security on top of convenient digital experiences, uncovers Experian research

As organisations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Based on insights from almost 6,000 consumers and 590 businesses...
Taxonomy: Cyber Safety

Threat Stack Improves Security Observability in Kubernetes with New Behavioral Analysis Capabilities

Threat Stack, the leader in cloud infrastructure security and compliance, announced enhancements to the Threat Stack Cloud Security Platform® that provide customers with complete...

Pages