Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.
New vehicle hacking threat exploits Bluetooth connectivity and targets a car’s infotainment system to access stored contacts, call logs, text logs, and in some instances even full text messages without the user being aware.
The holiday season in 2016 will see many of these large enterprises up their game in terms of protecting customer data. It’s not as if they have much choice, data breaches in the past have reduced public trust in online retailers – but the latest approaches to ensuring data security go some way to restoring that trust.
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President Donald Trump who is still using a legacy Android device. In this article we examine just why mobile devices present massive challenges when it comes to data security – and why business users need to be vigilant.
Almost 18 months since the 2017 massive outbreak, the WannaCry ransomware remains a cyber threat based on recent research from Kaspersky Labs showing 75,000 infections over the last three months.
With the aid of technology, insider fraud has outranked all other forms of fraud for modern businesses, ironically the companies are also using it to pre-emptively stop fraudsters in their tracks.