by Kerrie Bailey | Oct 30, 2017
A cyber security researcher of KU Leuven in Belgium, Mathy Vanhoef, has revealed a flaw in Wi-Fi’s WPA2’s cryptographic protocols. The discovery is alarming as the WPA2 protocol, the most common and secure Wi-Fi access protocol since 2004, is trusted by all for keeping Wi-Fi connections safe. read more
by | Sep 27, 2017
Using the hybrid cloud is much like streaming a movie on a home theatre system. Pulling the film from the cloud to your big screen TV, the home theatre experience marries the benefits of the public cloud with the comfort of not having to leave the house and overpay for popcorn. The hybrid cloud, with the public cloud benefits such as agility, elasticity, and on-demand computing, allows organisations to have complete control over their data, deploying the services to best meet their unique business, technical, and regulatory requirements. And one of the best ways for organisations to deploy hybrid cloud is with Microsoft Azure Stack. read more
by | Aug 15, 2017
A Nigerian national based near the country’s capital masterminded a wave of attacks on over 4,000 companies in oil & gas, mining, construction and transportation sectors.
San Carlos, CA — Tue, 15 Aug 2017 read more
by | Jul 27, 2017
Is your mobile enterprise protected effectively?
Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defence (MTD) solution, with Microsoft’s Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach to manage mobile devices and protect against advanced mobile attacks. read more
by | Oct 26, 2016
2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. read more