Blog
40% of cybersecurity professionals think paying ransomware demands should be illegal
September 6, 2019
0 Comment
By Connor Jones
A survey of top IT security professionals has revealed that 40% believe paying out as part of a ransomware demand should be made illegal.The majority of respondents believed that businesses should never pay an attacker to decrypt their data, although more than 40% said they would either consider it or
Cybersecurity And The Explosion Of Augmented Reality
September 6, 2019
0 Comment
By Paul Ryznar
Augmented reality (AR) technology is advancing with extraordinary speed, and new innovations hit the marketplace regularly. Powerful and sophisticated applications are being implemented in everything from manufacturing and industrial environments to shipping and logistics. While AR advances are unquestionably exciting, the industry is now grappling with a whole constellation of
Future of Cybersecurity: All-Hands on Deck
September 5, 2019
0 Comment
By IvyLee Rosario
With cybercrimes growing exponentially, commercial real estate experts weigh in on the future of cybersecurity. How do you stay one step ahead of a potential data breach? Automation of building functions and processes has accelerated the need for cybersecurity. From locks and HVAC systems to lighting controls and energy monitoring,
Effective Cybersecurity Can Help In Accelerating Business Transformation
September 5, 2019
0 Comment
By MURTAZA BHATIA
Across the digitally inter-connected world, we are globally witnessing a rapid change in technology resulting in a tectonic shift in the way man and machine interact with one another. Along with the benefits of agile network and super fast computing fuelling the digital economy, we have also encountered threats around
Semi‑annual balance of mobile security 2019
September 5, 2019
0 Comment
By Denise Giusto Bilić
Mobile security plays an increasingly important role in protecting information assets for both home and corporate users. In fact, with the advent of the Internet of Things and the thousands of non-traditional devices that are controlled by mobile applications, the security of our phones becomes increasingly relevant to protect the