Magazine Button


Panasonic Toughbook 55 integrates Viasat Eclypt core encrypted internal hard drive

Panasonic has announced that its modular Toughbook 55 notebook is now available for the defence industry with an integrated Eclypt core encrypted internal hard drive from global communications company, Viasat. The solid state self-encrypting hard drive is certified for use in the UK to secure top secret information and all security levels below, as well […]

Check Point Software report shows the enormity of global mobile malware attacks

Check Point Software’s Mobile Security Report 2021 shows almost every organization globally experienced a mobile malware attack during the past year. Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its Mobile Security Report 2021. The report examines the latest emerging threats targeting enterprise mobile devices and gives a comprehensive overview […]

Macquarie Telecom Group welcomes framework to protect Australia’s cybersecurity

Macquarie Telecom Group has welcomed the publication of the Whole of Government Hosting Strategy that seeks to protect Australia’s national security interests in the wake of increased cyberthreats. Macquarie Telecom Group has welcomed publication, by the Digital Transformation Agency, of the Whole of Government Hosting Strategy (Hosting Certification Framework), championed by the Minister for Government […]

How BT drives security from a necessity to a beacon of business responsibility

Steve Benton, BT Deputy CISO, GM Cyber and Physical Security Operations and Programmes, tells us how the company operates with full control over its complex IT estates and explains how the major telecom provider functions in a way that aims to make cyberattacks worthless for those targeting the business. Can you give an overview of […]

Qualys extends the power of VMDR to Android and iOS/iPadOS mobile devices

Qualys, a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, has announced it is expanding Qualys VMDR (Vulnerability Management, Detection and Response) to mobile devices with support for Android and iOS/iPadOS, delivering an end-to-end solution for mobile device security. Qualys’ all-in-one VMDR provides in-depth mobile device visibility, data security insights, proactive […]

Aura builds world’s first WhatsApp security chatbot in partnership with Tracker

Aura, South Africa’s leading security and medical response platform has launched the world’s first WhatsApp security chatbot in partnership with Tracker, one of the country’s most trusted names in stolen vehicle recovery. Powered by Aura, Tracker’s unique Tracker CareGuard service offers rapid mobile emergency response anywhere, anytime within South Africa. The new cutting-edge solution enables […]

RiskIQ’S 2020 Mobile Threat Landscape report finds 33% growth in mobile apps

RiskIQ, a global leader in attack surface management, has published its 2020 Mobile App Threat Landscape report, an analysis of the murky mobile app underworld spanning the open web and app stores around the world.  With a proactive, store-first scanning mentality, RiskIQ observes and categorises the threat landscape as a user would see it, monitoring […]

87% of EMEA CISOs claim mobile devices are focus of their cybersecurity strategies

Ivanti, the automation platform that helps make every IT connection smarter and more secure, has announced the results of a survey which revealed that the emergence of the everywhere enterprise has shifted CISO priorities away from combatting network security threats and towards mitigating mobile security risks. Almost nine in 10 (87%) CISOs surveyed agreed that […]

NEC facial recognition adopted by ‘Star Alliance Biometrics’ platform

NEC Corporation has announced that Lufthansa Airlines and Swiss International Airlines (SWISS), Lufthansa Group airline members of Star Alliance, launched the ‘Star Alliance Biometrics’ identity verification platform, utilising NEC’s facial recognition technologies, at Frankfurt Airport and Munich Airport. NEC and Star Alliance have been co-operating since July 2019 in the development of an identity verification platform […]

Vulnerabilities in standalone 5G networks could allow attackers to steal credentials and falsify subscriber authentication

Positive Technologies has published its ‘5G standalone core security assessment’. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of new standalone 5G network cores. The vulnerabilities in protocols HTTP/2 and PFCP, used by standalone 5G networks, include the theft of subscriber profile data, impersonation attacks and […]

Browse our latest issue

Magazine Cover

View Magazine Archive