<
>

Securing the New Normal Necessitates Businesses to Be the Hunter, Not the Hunted - ExtraHop

When talking about cloud computing, some people think that having such is the ultimate answer to their IT. Some believe that if you throw your IT infrastructure to the cloud, all is set and good. Yes, cloud may be helpful for...

Securing & Protecting E-Commerce Data

2020 saw a huge increase in e-commerce. While the pandemic may have played a big role in this, consumers themselves are now preferring to use e-commerce due to its simplicity and flexibility in getting things done. The demand for...

BAHAMUT – The Smarter Threat Actor on a Mission

Phishing scam cases continue to increase and are reported frequently. Many organisations and individuals continue to fall victim to such scams despite numerous efforts taken by their organisations in educating them on the dangers...

With the Rise of Complex Cyber Threats, Is Traditional Risk Assessment Still Relevant?

Broadly speaking, organisations are implementing risk assessments to identify what possible hazards are there in the business environment and the potential impacts it could bring to the company. This is to protect the various...

Connected TVs are Becoming a Prime Target for Ad Fraud

Many people today are consuming their entertainment through various devices, from small screens to big screens. In the perspective of technological evolution, we have moved from traditional TV broadcasts to on-demand streams...

An Industrial Conundrum: The Convergence of IT and OT

While most employees found themselves working from home during the pandemic, there will still many who could not work remotely simply because their job did not allow them to. Apart from the front liners, healthcare workers and...

Fully Integrated Cyber Protection With Acronis

As employees around the world continue to work remotely, the number of risks that they are exposed to increases as well. Cybercriminals know how to find vulnerabilities and exploit remote workers. Reports have shown an increase...

"Shadow IT" Interview with Dell Technologies

Shadow IT may sound sinister, but it is actually an occurrence that is rather common and affects the majority of today’s organisations, whether they realise it or not. It refers to IT devices, software or services that are...

F-Secure Investigation Reveals the Risks of Counterfeit Network Equipment

In the last quarter of 2019, an unnamed IT company found their two network switches failing after being subjected to software updates. The cybersecurity solutions company F-Secure was called to investigate. After a thorough...

Alyssa Herrera, bug bounty hunter at 16 years old

While most teenagers today are busy playing Fortnite, Instagramming or hanging out at malls with friends, 16-year-old Alyssa Herrera spends her time hunting for bugs. The full-time bug bounty hunter and security researcher based...