NEWS

Distology strengthens business proposition by acquiring Squareball

Distology, the specialist IT cybersecurity distributor, has acquired Squareball.

Read More

NEWS

3i Infotech launches Malaysia's first-ever Zero Trust Sovereign Cloud

NuRe 3i+ powered by Oracle, will provide both data and operational sovereignty.

Read More

NEWS

Cyberattacks have negative health impact

The average total cost for the most expensive cyberattack experienced by a healthcare organisation was $4.4 million, including $1.1million in lost productivity.

Read More

NEWS

Rise in retail industry hit by ransomware

Sophos has published a new sectoral survey report, The State of Ransomware in Retail 2022, which found that retail had the second highest rate of ransomware attacks last year of all sectors surveyed after the media, leisure, and entertainment industry. Globally, 77% of retail organizations surveyed were hit—a 75% increase from 2020. This is also 11% more than the cross-sector average attack rate of 66%.

Read More

NEWS

Channel 4 Television optimises cybersecurity

Projects can be managed on time and on budget, allowing Channel 4 to reduce their spend by nearly 80%, according to Channel 4 CISO Brian Brackenborough.

Read More

NEWS

Global supply chains held to ransom

Trend Micro research reveals visibility challenges as attack surface expands.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
The company adapts its Business Partner Program to achieve Unicorn 25 objectives.
Apricorn, manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB storage devices,...
Respondents point to unsecured network file folders as the biggest vulnerability point leading...
Outgunned security executives navigate complex obstacles to keep rising attacks from turning into...
Qualified Electronic Signature and One-time Password, combined with Onfido’s off-the-shelf...
The clock starts ticking immediately following a cybersecurity incident with the first 24 hours...