All Security articles – Page 23
-
ebook
Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
Webinar
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Article
Social housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
Q&A
Non-linearity, neurodiversity and the skills gap
A Q&A with UK Cyber Security Association founder Lisa Ventura
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Analysis
Trust, privacy and combatting crime: the tech behind Singapore’s facial recognition ID scheme
Singapore is to become the first government in the world to grant citizens access to services online using facial verification and UK-based provider iProov has won the contract. FinCrime Report speaks to the firm’s founder Andrew Bud about the technology and issues of privacy, anti-money laundering, security and trust.
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Report
Identifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
News
UK releases details of Russian cyber attacks against Olympics and Paralympics
GRU, Russia’s military intelligence service, hacked officials and organisations involved in the planned 2020 Tokyo Olympic and Paralympic Games, the UK government has announced.
-
Feature
Please mind the (cyber skills) gap
Amid the furore around a withdrawn UK government-backed cyber skills advertisement this week, Privsec Report takes a look at the messaging and what it says about cyber security recruitment.
-
Feature
Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations
-
Feature
COVID-19 FOCUS: Compliance, cloud migration and securing the “new normal”
As remote working looks set to become the new normal, businesses need to ensure their corporate information and data protection is secure. In the first in a series of Covid-themed articles this week, Andy Beverley outlines some of the key considerations.
-
News
Trickbot ransomware distributor taken offline following court order
An infamous botnet and distributor of ransomware has been taken offline following a US court order, Microsoft has said.
-
News
Former US security chief warns of increased cyber crime due to coronavirus
The former head of the US National Security Agency has warned that the coronavirus pandemic has significantly increased cyber risk, with companies likely to face a growing number of attacks.
-
Feature
Identifying, verifying and authenticating customers – which tech options will you go for?
Know Your Customer rules are tightening but bank customers increasingly want fast sign-up and quick banking. FinCrime Report looks at some of the identification and verification technologies currently being used to prevent fraud and money laundering in an increasingly complex landscape while ensuring user experience remains positive.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.