Interview with HID Global’s Vice President and Managing Director of Physical Access Control, Harm Radstaak, based in the Netherlands. HID…
NIST has released the preliminary draft of Special Publication (SP) 1800-19A, Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud…
We are excited to announce publication of the draft National Institute of Standards and Technology (NIST) Special Publication 1800-17: Multifactor Authentication for…
Specialist cyber underwriting agency Emergence Insurance has upgraded its policy wording to expand coverage. The innovative new wording, released on…
In this episode, Bruce Matthews, Director of the Melbourne Joint Cyber Security Centre speaks to Morry Morgan about the JCSC and highlights…
Cybercriminals are targeting mobile phone users by tricking them into downloading fake online banking apps. Mobile users who mistakenly download…
The Missing Link, Shearwater and SIEMonster among organisations to join new partner program developed by risk intelligence company ResponSight ResponSight…
New ESET research reveals that the hype around the role of AI and ML plays in cybersecurity could be putting…
In this interview, we discuss how Data Mining techniques and machine learning algorithms can be extremely useful when applied in covert channel detection and…
NIST announces the release of Draft NISTIR 8214, Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation…