Mike Hooper, Director of Digital Transformation (APAC) at OpenText A day in the life of the intelligent and connected enterprise…
The NSW Government is taking an integrated approach to preventing and responding to cyber security threats across the state, to…
McAfee Researchers Analyse Cryptomining Malware Trend, Windows 10 Cortana Vulnerabilities, Blockchain Attack Vectors, Mobile Billing Fraud Apps, and the Weaponisation…
MEF Accredited Training Providers offer limited time only special training and bundles for MEF-CECP re-certification and new MEF-SDN/NFV and MEF-NF…
NIST Requests Public Comments on Draft NISTIR 8228 NIST has released Draft NIST Internal Report (NISTIR) 8228, Considerations for Managing…
The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…
Digital Transformation Barometer finds better security needed to harness the positive potential of AI and mitigate risks of malicious attacks…
New independent report from Miercom reveals most top Wi-Fi solutions can’t automatically detect and prevent all six wireless threat categories…
Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…