Encryption

Partner Content
Digital Signatures: Making e-Procurements Safer

As technology evolves, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the latest technologies, today’s hackers are breaching organisations’ cybersecurity with surprising ease. 

What is the Crime Overseas Production Order Bill - and why does it matter?

Since 2015 the British government has been in talks with the United States about the passing of a new bill that has the potential to drastically extend the rights of authorities to access user data, without the user being alerted, and making that information legally admissible in court - marking a departure from the covert data scraping that was exposed by the Snowden revelations.

McAfee CTO in APAC on the risks of using the cloud & the impact of emerging tech

McAfee CTO in APAC talks about the risks of using the cloud and the impact of emerging tech in cybersecurity

What is Magecart and was it behind the Ticketmaster and BA hacks?

The phenomenally damaging cyberattack on British Airways last week saw the haemorrhaging of information from over 385,000 transactions, credit card and personal details included.

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

Human behaviour is the new perimeter: Matt Moynahan, Forcepoint

Digital identities will be the ultimate weapon for CSOs against the hackers says Matt Moynahan, CEO, Forcepoint.

Partner Content
Top 5 IT tips for remote and mobile teams

In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the United States. 

Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time. 

T-Mobile data breach FAQ: What happened, how it affects you, and what you should do now

T-Mobile has divulged that hackers made off with some personal data in an attack on its servers earlier this week. Here's what the company is saying and how it affects you.

Don’t let data security be your Achilles heel in transformation

The ruthless rampage of Cyberattacks is a worrying trend that threatens organizations of all scale. However, it should not slow down the adoption of latest technology offerings. Instead, devise strategies to ensure that security is met along your transformation journey.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.