BUSINESS > Services > IT & Telecoms

BUSINESS > Services > IT & Telecoms Category Archive

« Back to News

New Malware Hides In Memory

by Tim Heath on 2017-03-21 05:55PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

Read Full Story

A Common Language For Sharing Intelligence On Cybersecurity Threats

by Tim Heath on 2017-03-21 11:26AM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

Read Full Story

Keeping The Cloud Safe: Exclusive Report

by Tim Heath on 2017-03-21 10:00AM in NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

IT Managers are struggling keep their business applications and data safe in the Cloud, and many are slowing down adopting Cloud processes.

Read Full Story

DDoS Protection: 14 Unique Ways to Protect Your Organisation

by Tim Heath on 2017-02-24 01:54PM in NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

DDoS attacks have become a nightmare for companies with an active online presence. Here are 14 ways to protect your business.

Read Full Story

Bitcoin Is Increasing Ransom Attacks

by Neil Telford on 2017-02-21 10:33PM in BUSINESS-Services-Financial, BUSINESS-Services-IT & Telecoms, FREE TO VIEW, GOVERNMENT-Police, JOBS-HR & Training

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

Read Full Story

Stealthy Malware Is Going Mainstream

by Neil Telford on 2017-02-21 06:59PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

Read Full Story

Data Breaches Attack All Parts Of A Business

by Neil Telford on 2017-02-21 06:57PM in NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

Read Full Story

WhatsApp Becomes The Latest Victim

by Neil Telford on 2017-02-15 02:54PM in BUSINESS-Services-IT & Telecoms, FREE TO VIEW, NEWS-News Analysis

Is there a truly secure messaging app? Attackers could exploit a security vulnerability in WhatsApp to snoop on its users.

Read Full Story

How To Automate Cyber Defense

by Neil Telford on 2017-02-15 02:53PM in BUSINESS-Services-IT & Telecoms, NEWS-News Analysis, GOVERNMENT-Defence, FREE TO VIEW

Humans aren’t fast enough to respond to network attacks and breaches. Machines can help us, if we help them.

Read Full Story

Data Realities: 2017 & Beyond

by Neil Telford on 2017-02-15 02:17PM in NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Data Matters: A critical driving force in the global economy will be data exploitation, data value creation, data-sharing & data protection.

Read Full Story

Sign Up: Cyber Security Intelligence Newsletter: * indicates required
*