Find

August 4, 2020

Pulse Secure launches new zero trust service for multi-cloud secure access

PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources.
by | 3 min read
July 30, 2020

Cybercrime in Education – Institutes should make cybersecurity a priority

Education venues are subject to a very diverse array of cyber-attacks. As these institutions vary in size; thus, the cyber threats vary too. Institutions need to evaluate the risk and understand the risks completely to be able to address them. Data theft is the most common type of attack affecting the education sector at all levels.
by | 4 min read
July 26, 2020

Farnek appoints former London policeman as head of security

Philip has amassed an impressive array of awards, receiving the Metropolitan Police Service’s ‘Baton of Honour’ in 1999 and the Commanders Commendation six times between 2005 and 2016, as well as the Commissioners High Commendation in 2005.
by | 2 min read
July 25, 2020

Five basic principles for improved cyber hygiene in businesses

When it comes to basic cyber security, we should presume that nothing has changed. The same basic cyber hygiene principals, which are often the simple ones that are forgotten or overlooked, are still just as relevant. They should be kept front of mind to keep businesses – and their employees – safe.
by | 2 min read
July 23, 2020

Huge spike in cybercrimes with manufacturing on the front line

Emilian Papadopoulos, President of Good Harbor Security, stressed that the crisis had hit companies hard and imposed financial constraints that meant investments in cybersecurity are not necessarily a top priority. The attackers are still coming at us. They didn't stay at home and stop working. And the coronavirus has just taught us that Black Swan events happen.
by | 4 min read
July 13, 2020

Automation that matters and eliminates errors

With a variety of individuals implementing different configurations at different times along with the growing number of devices, it becomes difficult to compare configurations and patch updates to see if the correct one is in place.
by | 3 min read
July 2, 2020

New Cryptojacking and DDoS Hybrid Malware to Infect Windows Devices

The first wave of the campaign stopped on June 10, 2020. The attacker then resumed their campaign on June 11, 2020, spreading an upgraded version of the malware and wreaking havoc. The sample was compiled on Thursday, June 11, 2020 10:39:47 PM UTC and caught by Palo Alto Networks Next-Generation Firewall.
by | 2 min read
July 1, 2020

Cyber Security at Home’ webinar gives practical tips for viewers

The second Canon ‘Frontiers of Innovation Forum 2020’ online webinar […]
by | 2 min read
June 23, 2020

The right approach to securing 5G

5G promises transformative mobility by offering enhanced mobile broadband experience and enabling industrial digitalization through customer value creation. It’s particularly important to set high standards for connectivity, security and targeted service-level agreements.
by | 4 min read
June 18, 2020

Bosch sees factories’ future in connectivity

The internet of things (IoT) helps manufacturing companies react more flexibly than before to disruptions, since the utilization and condition of each individual machine can be tracked in real time, and there is transparency along the supply chain.
by | 3 min read