<
>

Posts in Cyber Crime & Forensic

Harnessing True Power of AI to Combat Cyber Threats

Authored By John Maddison, Chief Marketing Officer and Executive Vice President, Products at Fortinet  In the cybersecurity space, there has always been an unfair advantage for...

IBM Security Webinar: Enforced Remote Access Requires Zero Trust Access Management

Most companies built their identity and access management policies and solutions around known and expected perimeters of their networks and user locations. As the current world crisis throw those...

Open Virtual Panel Malaysia: Data Security and Privacy in the Digital Economy

Even non-Malaysian privacy laws like the GDPR can still impact Malaysian companies. The threat is not just about outsiders breaking in. The challenge of stopping internal team members from either...

Trojans, Backdoors, and Droppers Top the List of Most-Searched Malware by Security Analysts

Anonymised statistics from free requests to the Kaspersky Threat Intelligence Portal have revealed that almost three quarters (72%) of the analysed malicious files fell into three categories:...

Trend Micro Released Survey Showing Remote Workers' Cybersecurity Awareness During Lockdown

Trend Micro Incorporated, a global leader in cybersecurity solutions, released survey results showing how remote workers address cybersecurity. Nearly three quarters (72%) of remote workers say they...

IBM Study: Businesses Effectiveness in Preparing and Responding to Cyberattacks

IBM Security announced the results of a global report examining businesses’ effectiveness in preparing for and responding to cyberattacks. Organisations ability to contain an attack has...

What to do Before, During, and After a Ransomware Attack?

Over three years after the infamous Wannacry ransomware, its costly aftermath still remains a vivid glimpse on the damage cybercriminals can do by kidnapping companies’ essential data. This...

Singapore Revealed Parents in APAC Hide Their Private Data From Their Kids More Than Cybercriminals

Online users are well aware that kids can be naughty and hide their online activities from their parents. Children have a lot of secret activities online unknown to their moms and dads as revealed in...

Pulse Secure and Gigamon Partners to Strengthen Secure Access from Any Device

Pulse Secure, the leading provider of software-defined Secure Access solutions, announced successful integration and joint compatibility testing between Gigamon and Pulse Secure to ensure customers...

Okta, CrowdStrike, Netskope, and Proofpoint Join Together to Implement a Comprehensive Security Strategy

Okta, Inc., CrowdStrike, Inc., Netskope, and Proofpoint, Inc., announced the companies are coordinating to help organisations implement an integrated, zero trust security strategy...

Pages

Subscribe to RSS - Cyber Crime & Forensic