home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Cameo

SHARESHARESHARE
Application is the fuel of successful business and as the days of costly hardware and outdated infrastructure are over so, the cloud has brought the innovation the way we use, manage and use application. Cloud computing empowers enterprises with scalable, cost effective and innovative solutions. To fully utilize the power of the cloud capabilities, you need product designed for the modern computing landscape, built to handle modernization with zero coding to eliminate complexity with simplicity.
SHARESHARESHARE

RELATED NEWS


Hackers can figure out a person’s password by simply listening to them type on a keyboard, cyber security according to a new study. Using the microphone found on a smartphone, the new method is so effective that it can be carried out in a noisy public space where multiple people are typing, researchers at Southern Methodist University in Texas found. They discovered the technique by analysing the different sound waves produced when a key on a keyboard is struck. After processing the acoust...
THE INDEPENDENT
READ MORE

At the Information Security Forum (ISF), we state that an organisation’s information security strategy should support the business strategy and allow the organisation to conduct and grow its business in a secure and robust manner, by protecting the organisation’s assets – including information – against a range of threats.
Remember that open source may not be a panacea: these products may not be mature or robust enough for enterprise use, nor may their development ...

COMPUTERWEEKLY.COM
READ MORE

Mastercard is implementing biometrics for card payments, with plans to go live by April 2019. The financial giant said that all consumers will be able to identify themselves with biometrics such as fingerprints or facial recognition whenever they pay in stores with Mastercard. Biometric options will also be implemented for all contactless transactions made at terminals with a mobile device. In practice, that means that banks issuing Mastercard-branded cards will have to be able to offer biometri...
INFOSECURITY MAGAZINE
READ MORE

Google today announced a series of improvements to Gmail’s security aimed at making the service better at protecting business data. As part of the newly rolled out update, Gmail will provide customers with early phishing detection capabilities and "click-time warnings" for malicious links that might have been included in messages coming from outside sources. External reply warnings were also rolled out to help prevent data loss, Andy Wen, Senior Product Manager, Counter Abuse Tec...
SECURITYWEEK
READ MORE

Trend Micro has joined global law enforcement agencies and industry partners to take part in a new operation to take down major global botnet SIMDA. Operation SIMDA was executed last week to disable the 770,000 computer botnet, which is said to have infected machines in 190 countries worldwide. The worst affected countries were the US, UK, Turkey, Canada and Russia, according to Trend Micro. The SIMDA backdoor was used by cyber-criminals to redirect users away from legitimate sites like Facebook...
INFOSECURITY MAGAZINE
READ MORE

"Security researchers are warning of a newly discovered Ransomware-as-a-Service campaign using malware written in JavaScript for the first time.

Fabian Wosar of security firm Emsisoft explained in a blog post that Ransom32 can be signed up to on a Tor site using just a Bitcoin address to which the spoils will be sent—minus a 25% cut."...

WWW.INFOSECURITY-MAGAZINE.COM
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...