There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME …

There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME …
Recent massive cyber attacks that paralysed computer networks at several South Korean banks and broadcasters, strongly suspected to have been …
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams …
Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security …
The entire MDM (mobile device management) space is dead when it comes to the bring-your-own-device (BYOD) trend, according to IBRS …
A cyber espionage operation dubbed MiniDuke has targeted government organisations in as many as 23 countries, security vendors said on …
Times have never been better for security-focused channel partners. The fast changing threat landscape and the emergence of advanced threats …
Chinese authorities may be exploiting a security hole in Microsoft Office for Mac to target the Uyghur people, an ethnic …
The burgeoning mid-market is offers a plethora of opportunities for the channel willing to invest in services and solutions, and …
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …
So far, the evidence suggests Windows 8 has hardly been the gleaming success that Microsoft no doubt hoped it would …
Adobe updated Flash Player on Thursday in order to patch a pair of zero-day vulnerabilities that hackers have reportedly been …
Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed …
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …
The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun …
Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely …
Comguard has entered into a distribution agreement with Canada based security vendor, FixMeStick. FixMeStick is a technology innovation that is …
Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous …
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an …
Several high-profile security breaches around the world grabbed the attention of the Middle East IT industry, but it has taken …