How to protect your business from fraud during a recession

The global recession has many people – and companies – putting on warm sweaters as they turn down their thermostats. On the ground level, that means more people pinching pennies and looking... Read more »

Security buyers lack insight into threats, attackers, report finds

Cyber security leaders tend to be happy with the quality of threat intelligence they get from their industry partners, but struggle to generate real insight from it and are making uninformed, or... Read more »

Cyber security training: How to be as secure as is practicably possible

In the summer of 2021, analyst Gartner published its Market guide for security awareness computer-based training. It reported that the human element (85%) continues to be a primary catalyst for data breaches,... Read more »

Kubernetes vs Docker: What are the main differences?

Image: Song_about_summer/Adobe Stock Containers and microservices have become the darling technology of enterprise businesses. This is especially true if your company has adopted CI/CD and DevOps solutions or is looking to become... Read more »

How APCOA is using big data to reinvent car parks

Car parks may soon become a go-to destination for charging electric vehicles, collecting online shopping packages and catching up with emails. Trials starting this year will offer drivers office pods to work... Read more »

France latest to ban TikTok on government devices

Following the UK government and parliamentary bans enacted on video-sharing social media platform TikTok – citing data privacy concerns given TikTok’s Chinese origins – the French government has also moved to impose... Read more »

JP Morgan pilots palm and face-recognition technology in US

JP Morgan is testing out biometric-based payments with some of its business customers in the US retail sector to make payments more convenient and secure, as well as to increase take-up of... Read more »

Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study

Image: CROCOTHERY/Adobe Stock In Cisco’s new Cybersecurity Readiness Index, only 15% of respondents to the global survey said their organizations have implemented security programs mature enough to defend against current cybersecurity risks.... Read more »

How to work with containers in TrueNAS

In this quick tutorial, Jack Wallen shows you how to use container images to deploy and manage applications in TrueNAS. [embedded content] You might think of TrueNAS as only a network-attached storage... Read more »

vishing (voice or VoIP phishing)

What is vishing (voice or VoIP phishing)? Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data... Read more »

National Crime Agency sting operation infiltrates cyber crime market

The National Crime Agency has infiltrated a cyber crime marketplace by setting up websites pretending to offer the tools needed to mount distributed denial of service (DDoS) attacks. The sting was part... Read more »

Over a third of UK’s online transactions used digital wallets

Digital transactions worth about £259bn were made in the UK last year, with over a third (35%) of online purchases completed using digital wallets. The Worldpay from FIS global payments report 2023... Read more »

Adobe launches Firefly generative AI creative engine at Summit

Adobe launched a palette of products and innovations for Experience Cloud, Experience Manager and more at its event, but the key advance is generative AI, centered on Adobe Firefly, a new visual... Read more »

Why Veeam thinks ransomware warranty payouts are unlikely

Backup specialist Veeam recently rebranded its data protection offer as Veeam Data Platform. But key among the myriad updates and feature enhancements was a ransomware guarantee, with financial compensation if data can’t... Read more »
Subscribe to our Newsletter