Cyber Attack disrupts online services of Lloyds Bank
A fortnight ago, the digital services of Lloyds Banking Group were hit by severe DDoS Cyber Attack. A DDoS or Distributed Denial of Service...
Apple iPhone 8 to have Facial Recognition as Mobile Security
Apple Inc, the American Multinational technology company is said to be developing its next iPhone 8 with a facial recognition feature for mobile security....
Enterprise Information Networks and the Threat Environment
This post was originally published here by OLIVER LAVERY.
Securing an enterprise information system is no trivial task. That is because today’s systems are complex and...
How Google Secures G Suite Data
This post was originally published here by Rich Campagna .
Google recently released a whitepaper, Google Infrastructure Design Overview, which describes the Google infrastructure and operational model used...
Certified Ethical Hacker (CEH): What It Is, What It Isn’t, and Why It’s Important
This post was originally published here by Jonathan Gibson.
The Certified Ethical Hacker CEH) certification is more than just another paper to add to your...
THREE MYTHS ABOUT CISSP CERTIFICATION TRAINING…BUSTED!
This post was originally published here by (ISC)² Management.
Let's pretend you're planning a big trip, and you need a nice place to stay. After considering...
Artificial Intelligence to combat Cyber Attacks!
Endpoint Security company Endgame has designed an Artificial Intelligence (AI) software to help combat Cyber Attacks. Known as Artemis, the AI software will process...
Mobile Security Company LookOut achieves FedRAMP Certification
Mobile Security providing company LookOut has achieved FedRAMP Certification giving it eligibility criterion to serve federal agencies looking secure cloud adoption. And as a...
NATO withstands 500 Cyber Attacks a day!
NATO, the North Atlantic Treaty Organization also known as North Atlantic Alliance is said to be witnessing around 500 cyber attacks a day on...
SHORTEN YOUR DETECTION CYCLE WITH UPGUARD’S EVENTS SYSTEM
This post was originally published here.
UpGuard's Events systems provides a communication hub to send the data that UpGuard gathers to external systems. Integration between...
MOST POPULAR
The Underestimated Cyber Threat: Anticipating and Combatting Supply Chain Attacks
By Prasad Sabbineni, Co-Chief Executive Officer at MetricStream
Cybersecurity threats are multi-faceted, often connected, and accelerating fast. Ransomware, nation-state attacks, employee errors, and third parties...