Software Contract Solutions

The new front line of cyber security is mobility

The insecurity of mobile devices and the vulnerabilities of public WiFi networks remain at an all-time high. These days, it’s not uncommon to hear cyber security experts talk about the eroding perimeter. With the advent of mobile and cloud, what was (or at least seemed to be) a clearly defined demarcation point between the private … Read more

Mac malware more than doubled in 2017

Malware targeting Apple Mac computers more than doubled from 2016 to 2017, according to security firm Malwarebytes. Apple Mac computers are traditionally considered to be less vulnerable to cyber attacks, but malware targeting their operating systems is on the rise, warns security firm Malwarebytes. According to the firm’s statistics, Mac-specific malware increased by 270% in … Read more

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub. Microsoft is working to create a blockchain-based, decentralized digital identity management platform that would allow users to own and secure access to their online persona via an encrypted database hub. … Read more

Cisco: 32% of businesses are ‘highly reliant’ on AI for cybersecurity

Malware sophistication is increasing and hackers are better evading detection with encryption, leading CISOs to rely more heavily on automation, according to Cisco. With malware growing increasingly sophisticated, CISOs are turning to artificial intelligence (AI) to combat cyberthreats and protect their companies’ assets, according to a Wednesday security report from Cisco. Some 39% of CISOs said their … Read more

How AI will underpin cyber security in the next few years

Cyber security risks are growing in complexity and volume, but artificial intelligence techniques can help businesses track and fight them in real time. Cyber criminals continue to launch increasingly sophisticated and devastating attacks on industrial, business and financial organisations around the world – and the damage from such crime could reach $6tn by 2021, according … Read more

Securing the future: The evolution of cyber security in the wake of digitalization

cyber security in the era of digitalization

With threats becoming more complex, moving from basic attacks against one device to complicated attacks against every device on an organisations network, traditional security simply isn’t enough in the age of digitalization.  Thinking back 30 years, heads of IT had a comparatively enviable task when it came to cyber security. Although the job was by … Read more

How to protect an organisation: 5 cyber security tips

At the beginning of each new year there is no shortage of information security predictions and warnings. As we move further into 2018, Corey Nachreiner, CTO at WatchGuard Technologies takes stock and identifies five key issues to look out for. 1. IoT botnets will force governments to regulate In 2016, the Mirai botnet showed the … Read more

Ransomware was most popular cyber crime tool in 2017

Ransomware attacks on business increased by 90% in 2017, while attacks on consumers leapt by 93%, according to the latest annual state of malware report by security firm Malwarebytes. The monthly rate of ransomware attacks was up to 10 times more than in 2016, with September 2017 having the largest volume of ransomware attacks against businesses ever documented. … Read more

Is 2018 the year cybercrime becomes mainstream?

The issue of cybercrime was thrust into international conversation last year, but what will the phenomenon look like in 2018? Cybercrime really hit the headlines in 2017, with the likes of WannaCry crippling the National Health Service in May, the Petya/NotPetya ransomware attack infecting global companies shortly afterwards and a whole host of data breaches … Read more

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves. Senior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a high level of access to such … Read more