PLATFORM SECURITY

Know the Use Cases of Biometric Technologies

April 4, 2022

Know the Use Cases of Biometric Technologies
Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Spotlight

VivoSecurity Inc.

VivoSecurity is transforming how business calculates security risks…by putting a dollar value on cyber-security events to help plan how – and where – you should spend your security budget.

Other Infographics
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

2019 Cyber Etiquette: A Guide To Today’s Top Cyber Threats

Infographic | December 20, 2019

The best detection and response solutions provide deep visibility to secure and investigate potential risk. Greater automation and contextualization of security events brings more informed decision-making, faster triage and effective remediation of threats.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More

Spotlight

VivoSecurity Inc.

VivoSecurity is transforming how business calculates security risks…by putting a dollar value on cyber-security events to help plan how – and where – you should spend your security budget.

Events