Network
NCSC joins partners to issue warning about China state-sponsored cyber activity...
The UK and agencies in the US, Australia, Canada and New Zealand have issued new advice to help organisations detect China state-sponsored activity being carried out against critical national infrastructure networks. In the new joint advisory the National Cyber Security Centre – a...
Türk Telekom delivers DDoS protection services for business customers with A10 Networks
One of Turkey’s leading integrated telecommunication operators, Türk Telekom, has announced it has deployed A10 Thunder TPS from A10 Networks to deliver DDoS protection services for its business customers. The service is protecting critical infrastructure from DDoS attacks,...
Corero Network Security chosen by Dakota Carrier Network to provide DDoS defence
Corero Network Security, a specialist provider of real-time, high-performance, automatic distributed denial of service (DDoS) protection, has announced its partnership with Dakota Carrier Network (DCN). North Dakota’s largest fibre optic network has selected Corero Network Security to...
Capita confirms it suffered a cyberattack
On Friday March 31, Capita, a leading provider of business process services, experienced a cyber incident primarily impacting access to internal applications. This caused disruption to some services provided to individual clients, though the majority of its client services remained in operation....
Features
Nuance voice biometrics to boost security at Santander
Nuance Communications, has announced Santander is making phone banking more seamless and secure through Voice ID, a system that leverages...
Password protection: Tips on how to secure the ‘keys to the kingdom’
Research from LastPass by LogMeIn, a leader in password management, has revealed that while businesses are making strides in...
CyberArk expert on securing the paperless health service
The increased use of electronic personal information, coupled with rapid advances in healthcare technology, has created complex...
Insights
11 steps to develop effective ransomware response
Anthony Giandomenico, VP Global Security Consulting, Proactive & Reactive Services, Fortinet, and Aamir Lakhani, Global Security...
Confronting the rising tide of ransomware
Ransomware is now commonly referred to as a ‘pandemic’ due to its widespread disruptive nature and its critical capabilities...
Four strategies for making the network safer
Adrian Taylor, Regional VP of Sales at A10 Networks, discusses the key considerations cybersecurity leaders should include in their...
IoT and OT security: The challenges, benefits and why you should care
As digitisation ramps up, industry leaders are utilising IoT technology more frequently. Paul Keely, Chief Cloud Officer at Open Systems,...
Case Studies
Infosys deploys RSA solutions to protect and manage extensive global infrastructure
IT giant, Infosys, has half a dozen strategic partners it relies on to deliver key components of its security stack. Executives from the...