Displaying items by tag: Encryption

Attention to detail is crucial when maintaining cybersecurity within an organisation. Security controls must be consistent and robust and extend to every aspect of the system. However, it must be noted that adversaries only need to identify one or two vulnerabilities to breach an enterprise’s defences, making it clear why they continue to find ways to infiltrate systems. 

Published in Guest Opinion
Monday, 03 March 2025 10:26

Affordable VPNs That Protect Your Privacy

In the current digital landscape, online privacy is more crucial than ever. Intrusive tracking and data leakage have never made a reliable VPN more critical. Finding a cost-effective solution that protects your data without sacrificing functionality could be complex. Many low-cost VPNs take quick cuts, which leads to laggy connections or insufficient security, making them unfit for everyday use. The secret is to strike a balance between price, security, and performance while ensuring the VPN you select offers complete protection. When choosing an affordable VPN, essential factors include security features, performance, and user recommendations.

Published in Guest Opinion

While organizations pour resources into advanced threat detection systems and cutting-edge security tools, they often miss fundamental elements that could make or break their cybersecurity defenses. These overlooked components create vulnerabilities that sophisticated attackers are all too happy to exploit.

Published in Security
Monday, 07 October 2024 20:34

Be ready for encryption in quantum era: DigiCert

Quantum computers are on their way to surpassing their classical computer counterparts in practical applications. When this happens the bulk of the world's cryptography is rendered null and void. It's time to ensure you are ready for the new era, says DigiCert.

Published in Enterprise Solutions

Once it was unthinkable to use a credit card online. Today, online commerce is booming, and there's a small army working to ensure this trust is not misplaced. However, recent technological advancements mean digital trust must evolve to keep us protected. And the time to act is now.

Published in Security

It took just one question from Paul Karp, chief political correspondent at Guardian Australia, to put the brakes on at the National Press Club on Wednesday, during a Q&A for two top Australian security officials.

Published in Open Sauce

This year’s World Backup Day on 31 March serves as a timely reminder for organisations to “up their data protection game” by having the right recovery and ransomware protection capabilities, according to the latest protection trends report from Veeam.

Published in Security

GUEST OPINION:  As more and more businesses embrace digital transformation, APIs (Application Programming Interfaces) have become a crucial part of practically every company's IT infrastructure. APIs are useful because they make it easier for programs to communicate with one another and share information, but they also pose security risks. Implementing a strong API security strategy is crucial for protecting APIs and the sensitive data they handle. Protection against cyberattacks and unauthorised use is an essential part of API security. All requests made to an API should be checked for authenticity and validity by a security system.

Published in Guest Opinion
Wednesday, 13 December 2023 07:32

Hey threat actors… we see you!

GUEST OPINION:  A huge cybersecurity threat exists because threat actors are hiding in one of the very mechanisms created to protect us — encryption. That’s why my company has launched a breakthrough cybersecurity technology for the world, specifically designed to eliminate this blind spot.

Published in Guest Opinion

A team of experts led by Monash University researchers, in collaboration with Australia’s national science agency CSIRO, have announced the creation of an algorithm that can help strengthen online transactions that use end-to-end encryption against powerful attacks from quantum computers.

Published in Security

iTWireTV: Gigamon chief product officer Michael Dickman explains why encrypted traffic is becoming the biggest blind spot for an organisation, and how Gigamon is solving this challenge for customers through its precryption technology.

Published in Guest Interviews

GUEST OPINION by Lena Fuks, Aqua Security: In the ever-expanding realm of AWS, with over 200 services at our disposal, securing cloud account configurations and mastering complex environments can feel like an overwhelming challenge.

Published in Guest Opinion

GUEST OPINION: Over 90% of attackers are using the same tactic to cover their tracks that security teams use to protect their data, and broadly speaking, no-one is watching.

Published in Guest Opinion

GUEST OPINION: IT leaders are currently facing a hybrid cloud security conundrum. While the hybrid cloud market is going through impressive growth, the multiple benefits around the agility and scalability that come with hybrid cloud infrastructure are paired with serious concerns about its security.

Published in Guest Opinion

Apple has threatened to withdraw services like iMessage and FaceTime from the UK, if it is forced to implement measures around encryption by the government.

Published in Technology Regulation

A survey conducted for data security and management specialist Cohesity has found 78% of respondents say their organisation would pay up in response to a ransomware attack if it thought this would allow the recovery of data and business processes, or if the payment would result in faster recovery.

Published in Security

GUEST OPINION: Cybersecurity is not reserved for big corporations alone. Small businesses must recognise that security by obscurity is a myth in an era of automated cyberattacks.

Published in Guest Opinion

GUEST RESEARCH: Gigamon, the leader in deep observability, today announced its Hybrid Cloud Security trends report, emphasising a significant gap between the perception and reality of how secure organisations truly are from cyberthreats.

Published in Guest Research

GUEST OPINION: Large-scale enterprises can no longer get away with simply having on-premises systems, hence migrating some of the digital operation to the cloud has become a necessity.

Published in Guest Opinion

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments