Cyber Security Conferences

5 Cyber Security Conferences Worth Attending This Year

Just like in the video game and smartphone industries, conferences play a crucial role in the cyber security industry. Cyber security conferences not only show the latest in cyber protection…

Read More
SSO How It Improves Cybersecurity and User Experience

SSO- How It Improves Cybersecurity and User Experience

The launch of the Single Signing Project (SSO) in an organization is often associated with user dissatisfaction with current IT systems and the need to remember several user IDs and…

Read More
Open EDR
New Hybrid Computing Same Security Concerns

New Hybrid Computing, Same Security Concerns

Pulse Secure, with the cooperation of IDG Connect has released its 2019 State of Enterprise Secure Access research paper, detailing how cloud computing has influenced companies’ daily operations and how…

Read More
IT Security Sensitivity In The Financial Sector

IT Security Sensitivity In The Financial Sector

IT Security’s importance is absolute, regardless of whether the corporate decision makers agree or not. It is the foundation where company’s survivability stands on. If a major failure occurs in…

Read More
Cathay Pacific 2014 Breach Fully Disclosed By Hong Kong

Cathay Pacific 2014 Breach Fully Disclosed By Hong Kong

The Hong Kong Special Administrative Region in China, through its Privacy Commissioner, Stephen Kai-yi Wong has publicly disclosed a report containing more findings about the October 2018 data breach involving…

Read More
Victoria’s Public Health System Highly Vulnerable 1

Victoria’s Public Health System “Highly Vulnerable”: Report

Victoria’s public health system is “highly vulnerable” to a Singapore-like data breach, according to a recent report. As per an auditor general report released recently, the public health system in…

Read More
Points To Consider Before Selecting a Secure Web Gateway 1

Points To Consider Before Selecting a Secure Web Gateway

Information technology has undergone a major transformation in recent years. Today, infrastructure, applications, and data – almost everything – are moving to the cloud. Whether it’s the public or private…

Read More
enterprise email

Our Long Collective Struggle To Secure Enterprise Email

Email is the oldest service on the Internet, launched in the 1970’s, it is older than the WWW or the World Wide Web itself for more than three decades. However,…

Read More
The Sad State of New Zealand’s Cyber Attack Readiness 3

The Sad State of New Zealand’s Cyber Attack Readiness

The New Zealand Financial Innovation & Technology Association (FinTechNZ), a financial-technology organization has exposed the alarming situation of companies based on New Zealand, only around 6% have a reasonable level…

Read More
SMB’s Cybersecurity Challenges

Simple Changes To Address SMB’s Cybersecurity Challenges

Cybersecurity is a term that generally refers to measures to prevent unauthorized use of computers and networks. Originally the term “cyber” was first coined in the 1940s, the dawn of…

Read More

Page 2 of 7

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register