cyber security

Cloud Access Security Brokers and Cyber Security Chicago

This post was originally published here by Prasidh Srikanth. Recently, Bitglass participated in the Cyber Security Conference in Chicago. At our booth, we were listening to customer stories about how they are strengthening their cybersecurity and adapting to changing technological trends; specifically, cloud and bring your own device (BYOD). Whether we spoke with universities or financial services organizations, […]

VPN Security: What You Need to Know

A VPN is the most important part of a secure online existence. They have function in security and privacy, keeping you anonymous from your ISP and hiding any identifying information from network snoopers. In theory, all VPNs should operate this way, but that’s not the case. We’re here to give you a guide to VPN […]

UK CEOs feel that Cyber Attacks on their companies are inevitable

At least 4 in 10 CEOs in the United Kingdom feel that cyber attacks on their companies are inevitable and this was disclosed in a survey conducted by KMPG- a Netherlands based Tax and Business Advisory Institute. The global consultancy firm which conducted a poll on 1300 respondents says that many of the leaders holding […]

Cyber Crooks are now turning to Cryptojacking from Ransomware attacks

Kaspersky Labs latest report suggests that Cyber Crooks are turning to crypto jacking from ransomware attacks and that’s due to the fact that the former is proving more profitable than the latter. The report compiled by the Russian Cybersecurity firm suggests that the total number of users who encountered ransomware has fallen by around 30 […]

IBM to boost cybersecurity defenses of NHS after WannaCry Attack

In May 2017, the databases of NHS UK were hit by WannaCry Ransomware Attack which resulted in disruption of the digital services in the said healthcare organization for weeks. After almost a year, the healthcare organization of Britain has decided to boost its cybersecurity defenses by hiring IBM’s advanced Cyber Security Services such as vulnerability […]

Two US companies awarded $45 million in contracts to protect 600 dams from Cyber Attacks

United States Interior Department’s Bureau of Reclamation has awarded two US companies $45 million worth contracts to protect 600 dams spread across 17 states from Cyber Attacks. The names of the two companies are Booz Allen Hamilton and Spry Methods, a Virginia based start-up. The contract covers technical and professional service offerings to protect the […]

Homeland Security to probe potential cybersecurity threats posed by ZTE

As security scare among US government entities in using the products delivered by Chinese Telecommunication firm ZTE has increased in recent month’s, Homeland Security has been directed by House of Representatives to probe into the matter. The probe will be focusing on any cyber risks introduced by use of ZTE products on federal state, and […]

Almost all Airports are vulnerable to Cyber Attacks

A recent report released by PA Consulting Group has claimed that almost all Airports operating in the United Kingdom are vulnerable to Cyber Attacks. The report named “Overcome the Silent Threat” was compiled based on in-depth analysis and interviews with some of the top staff of 4 major international airports. The study claims that as […]

Victoria State’s Cyber Security Strategy to get a boost with $17.6 million investment

The Australian government is becoming dead serious when it comes to raising the ante of its country’s cybersecurity defenses. And the best example to prove its objective is the recent $17.6 million investment allocated to deliver the Victorian’ government’s first ever Cyber Security Strategy. According to a press release issued by the State Government of […]

Firms in UK and US fail to financially plan for Cyber Attacks

Is your organization financially ready for cyber attacks? If it isn’t so, then it is better to be late than never. A survey conducted by Lloyds Bank has revealed that only a third of UK firms have a financial plan in place to mitigate the risks associated with cyber attacks. Rest of them are either […]

Share this page