<
>

Posts in Cyber Safety

Akamai Data Reveals Increase in Cyber Attacks Driven by Online Holiday Shopping

Akamai Technologies, Inc., the world's most trusted solution to power and protect digital experiences, released today new data detailing the prevalence of malicious botnet attacks during the...

Cloud vs. "Traditional" IT Compliance

Authored by: Kristin Manogue, Global Programs, at Check Point Software Technologies According to a Gartner survey in 2020, 81% of the companies are using at least two or more cloud...

Qualys March 2022 Patch Tuesday

Authored by: Bharat Jogi, Director, Vulnerability and Threat Research, Qualys Microsoft Patch Tuesday Summary  Microsoft has fixed 92 vulnerabilities, including 21 Microsoft Edge...

Fortinet Sheds Light on the Top Three Threat Categories in Malaysia and the Resourcefulness of Cybercriminals

Viruses are one of the top three categories that Fortinet regards as having a serious impact on Malaysia's security landscape, said Jonas Walker, Security Strategist, Fortinet, at a recent...

Lenovo Introduces New Endpoint Management Tools to Improve IT Efficiencies and Better Secure Devices in the Hybrid Workplace

Lenovo announced the launch of two software services designed to simplify endpoint management for IT administrators juggling multiple priorities. Introducing Lenovo™ Deployment Assistant (LDA)...

Ivanti March 2022 - Patch Tuesday

Authored by: Chris Goettl, Vice President, Product Management for Security, Ivanti March Patch Tuesday got off to an early start this month with CISA adding 95 vulnerabilities to their Known...

The Human Heart and Human Ethics for Data Protection

The sentiments “data is the new gold” and “data is the new oil” have floated throughout the business world as data is described as the newest precious resource. But, from our...

Multi-Factor Authentication vs Ransomware: Why Your Password isn't Enough

Authored by: Kamal Brar, Vice President, Asia Pacific and Japan, Rubrik. A global spike in ransomware threats occurred as organisations ramped up digitalisation efforts during the pandemic. Given...

A Three-Point Plan to Find Your Security Vulnerability Before Hackers Do

Authored by: Keith Bromley,Sr. Solutions Marketing Manager at Keysight Technologies Every network has a security vulnerability - where is yours? One of the top questions on the minds of network...

Seven Ways to Keep your Smart Home Devices out of the Hands of Hackers

Whether it’s a speaker that can also curate a shopping list, a doorbell with a fully functioning camera or a smoke alarm that connects directly to your mobile phone to remind you to replace...

Pages

Subscribe to RSS - Cyber Safety