Blog
It’s Time for IoT Security’s Next Big Step
December 9, 2019
0 Comment
By Lily Hay Newman
Connected devices are more secure than ever. That’s still not nearly enough. THEInternet of Things security crisis has persisted for decades, producing a seemingly endless stream of under-secured consumer gadgets, corporate phones, printers, networking equipment, medical devices, and critical infrastructure sensors and controllers. By now, every industry has an IoT
By FARWA SAJJAD
Email communication even today remains a valuable tool because of its ubiquity. Organizations across various industries depend on business email as their primary means of reaching out to clients and employees as well as other stakeholders. Although cybersecurity threats can spread through various channels, attackers know they can target more
Why 5G could be a cyber security nightmare
December 6, 2019
0 Comment
By Connor Jones
If you’ve been keeping up with the headlines, you’d be forgiven for thinking the paramount concern with the security of 5G, the latest in hyperfast mobile networking technology, is the alleged threat Huawei poses to national infrastructure. But, if you speak to the experts, there are far more troubling concerns afoot. It’s not
How to protect computers that store biometric data from malware
December 5, 2019
0 Comment
By Lance Whitney
Biometrics are supposed to provide a more secure and easier way of protecting sensitive data. Using your fingerprint, your face, or your voice to sign into an account or retrieve personal information is considered a better and safer option than trying to juggle an array of passwords. Biometry-based authentication is
2020 cybersecurity challenges will need many lenses
December 5, 2019
0 Comment
By INDI SIRINIWASA
Regardless the state of digital transformation at an organisation, cybersecurity must always remain a corporate priority. But adding to the complexity of the ever-widening attack surface, is the increasing reliance on cloud computing and the Internet of Things (IoT), and the associated impact both these have on DevOps. With the