Report shows media and entertainment industry are facing a unique set of cyber threats such as using offensive and threatening content, pirating goods and counterfeiting tickets.
Organizations should be wary of the security risks posed by AR technology with growth in usage for lowering operational costs, increasing productivity and streamlining processes.
In this second part of a two part series we will be taking a look at how online retailers are taking steps to mitigate against the almost inevitable threat to data from hackers that seems part and parcel of the holiday buying season.
The international community is under no illusion regarding the persistent threat that is posed by Russian hackers as the U.S. Department of Justice indicts 7 Russian GRU members, and other nations including the U.K. and the Netherlands protest hacking activities.
U.S. federal agencies issued a joint cybersecurity advisory over cyber threats targeting water facilities and wastewater treatment plants threatening water safety and availability.
The annual ENISA threat landscape report is one of the most helpful tools for keeping a finger on the pulse of current trends in cyber threats. This year's report highlights the dramatic rise in denial of service and cryptojacking attacks.
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
Chinese hackers have just pulled off one of India’s biggest cyber fraud ever by convinceing the head of a local Indian subsidiary of an Italian firm to wire $18.6 million from bank accounts in India to a bank account in Hong Kong.
Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.
Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.