home.aspx
 
EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

AVG Technologies


AVG delivers products and services to help make your digital world simpler to navigate, easier to secure, and more enjoyable to live in. Using the latest technologies in protection, privacy, and performance, our focus is on providing you with a secure, safe and frustration-free digital life. The AVG portfolio offers solutions for desktops and mobile devices on popular platforms such as Windows, iOS, Android and Mac—providing a wide range of solutions for individuals, families, and small businesses alike.

RELATED NEWS


The internet by default is not always safe, which is why Safer Internet Day on Feb. 5 exists—it’s a day to educate and remind users about the steps that should be taken to reduce cyber-security risks. But what are the unsafe things that users are doing online? Google conducted a study along with a Harris Poll of 3,000 Americans over the age of 16 to try to gauge the current state of safe, or in many cases unsafe, internet usage. Among the key findings in the study is that there is a ...
EWEEK
READ MORE

The head of America's National Security Agency said Tuesday that Russia was behind the 11th-hour hack of French President-elect Emmanuel Macron's campaign team, and that US officials had informed France a cyber-attack was underway....
SECURITYWEEK
READ MORE

Organizations across the US and Japan have plans to increase their use of artificial intelligence (AI) and machine learning (ML) this year, yet many don't really understand the technology, according to a new report from Webroot. A survey of 400 IT professionals from businesses across the US and Japan, conducted by LEWIS between November 26 and December 5, 2018, asked participants whether they plan to implement AI and ML. The results, published today in the global report, Knowledge Gaps: AI a...
INFOSECURITY MAGAZINE
READ MORE

Since Windows 8, Microsoft has built drive encryption into its operating system, so none of this should really be a shock. And this encryption feature shouldn't be confused with Bitlocker, which is aimed at power users and businesses; think of this feature as a diet Bitlocker...
THEREGISTER
READ MORE

Bitcoin is, however, controversial. It’s lack of traceability – in that respect, it’s like cash – has meant that it has become a currency of choice for cybercriminals. It’s also a fluctuating currency whose value can oscillate quickly on the open market, not being tied to any one currency or even a gold standard. And it’s less than secure, it would seem: Mt. Gox, one of the largest bitcoin exchanges, has gone bankrupt after hackers made off with all of its res...
INFOSECURITY-MAGAZINE
READ MORE

ESET security researchers have discovered 12 new OpenSSH backdoor families that haven’t been documented before. The Secure Shell (SSH) network protocol allows the remote connection of computers and devices. The portable version of OpenSSH is implemented in almost all Linux distributions, and attackers looking to maintain persistence in compromised Linux servers usually backdoor the installed OpenSSH server and client. With the OpenSSH code freely available, it is easy for attackers to buil...
SECURITYWEEK
READ MORE

EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...