Kingston Technology insists latest counter-infringement products can repel threats and ensure hospitals and staff ‘protect the data they are entrusted with’.
EMEA firms take almost six months to detect a cyber-attack: report
FireEye has announced the release of its annual M-Trends report, which found that attackers were present in EMEA organisations’ networks a median of 175 days before being detected in 2017. 0 1972Tenable’s analysis reveals over 22 billion records exposed
Tenable’s analysis of data breaches in 2020 reveals over 22 billion records exposed.
Three people charged over major Twitter hack
Three people have been charged of the recent major Twitter hack that commandeered the accounts of prominent political figureheads, technology moguls and celebrities last month.
Time to rethink your approach towards password change
If there’s a valid reason to change one of your passwords, do it right away to stay ahead of the crooks, says Paul Ducklin, principal research scientist, Sophos.
Hacking victims are uncovering attacks faster: FireEye
The global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, …
Saudi Arabia accused of hacking Jeff Bezos’s phone
Amazon.com’s founder and CEO Jeff Bezos’s mobile phone was hacked in 2018 following an exchange with the Saudi Prince Mohammed bin Salman on encrypted messaging service WhatsApp.
Endpoint security processes and visibility remain challenges: SANS Institute
Centralised logging and automation solutions are now a necessity to detect, defend against and respond to modern attacks, according to the SANS 2019 Endpoint Protection and Response Survey.
Human vulnerabilities cause the most devastating cybersecurity breaches: study
A majority targeted cyber-attacks are successful because of human error, according to the latest study by cybersecurity and compliance company Proofpoint.
IT managers struggling to keep up with growing cyber threats: Sophos
One in five IT managers surveyed didn’t know how they were breached, and the diversity of attack methods means no one defensive strategy is a silver bullet, according to a recent report by Sophos.
Most organisations are “ill-prepared” against privileged access abuse: survey
Organisations are still ill-prepared to protect themselves against privileged access abuse – the leading cyber-attack vector, according to a recent survey conducted by Centrify in partnership with TechVangelism.