Promoted | South African small businesses are particularly vulnerable to cyberattacks, says ESET Southern Africa’s Steve Flynn.
Browsing: Information security
Promoted | The principle behind data-centric security is simple: begin cybersecurity efforts by protecting what’s most important to your business, its data.
Con artists are taking the personal approach. And they’re getting so good at it that even cybersecurity experts are being taken in.
FBI director Christopher Wray warned Western companies that China aims to “ransack” their intellectual property so it can eventually dominate key industries.
Promoted | Acquisition extends attack path management platform through addition of continuous control monitoring innovator.
Apple plans to release a new feature called “Lockdown Mode” later this year that aims to add a new layer of protection for targets of sophisticated hacking attacks.
An Italian company’s hacking tools were used to spy on Apple and Android smartphones, Google said in a report.
Promoted | There’s a way for organisations to pinpoint and remediate cyber exposure with the highest financial impact. Learn more in this podcast with Skybox.
Promoted | FortiRecon continuously monitors an organisation’s external attack surface, determines its brand risk, and delivers custom intel to act earlier and faster on threats.
Promoted | Fortinet has pledged to train a million professionals in security skills by 2026. Learn more in this podcast with the company’s Paul Williams.