Strength in numbers

It can be painful for an organisation to admit that their systems have been breached by a cyber-criminal. However, as cyber-attacks become more aggressive, it is essential that data on cyber-criminality is shared and analysed. It may be that sharing this data, even among competitors, will be the key to protecting our most sensitive information.

Bring your own decision

As mobility becomes essential in business operations, enterprises need to decide how to handle their employee base when it comes to device usage in the workplace. Be it employer-provided devices or BYOD, enterprise mobility plans need to be both robust and adaptive.

Cisco launches AMP Threat Grid at GISEC 2015

Cisco today unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.

Cyberoam to showcase Layer 8 technology during GISEC

The security company intends to leverage the event to educate regional businesses and CXOs on its patented Layer 8 technology and shall showcase how IT and security teams in the region can benefit from Cyberoam’s network security innovations.

Palo Alto discovers widespread Android vulnerability

Palo Alto Networks has revealed details of a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of a seemingly safe application – Android Package File (APK) – on user devices, replacing it with an app of the attacker’s choice.

Six simple security mistakes

Many recent studies of security vulnerabilities come to the same conclusion: The human factor is a greater risk to organisations than flaws in technology.

Kaspersky: Cyber-espionage more sophisticated

State sponsored malware is becoming increasingly sophisticated according to a report released by security vendor, Kaspersky Labs. According to a company statement, this new trend was confirmed during analysis of the EquationDrug cyber-espionage platform, the main espionage platform developed by the Equation Group.

Safety on the go

There is no question that the use of mobile devices, both personally and professionally, are now not only convinient, but necessary for productivity. As the mobile technology develops, mobile security best practices must also adapt.

Kaspersky: Critical infrastructure faces severe threats

Cyber-terrorism attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky Lab.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines