aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
9/22/2017 1:00:35 PM
Contributor:
James Maude

SEC hack acts as another security wakeup call

The U.S. Securities and Exchange Commission (SEC) has revealed that it’s fallen victim to a hack. In its recent “Statement on Cybersecurity, published by its Chairman, Jay Clayton, it was revealed that its controversial Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system had been compromised last year and "may have provided the basis for illicit gain through trading".

Continue reading
Date published
9/18/2017 3:11:25 PM
Contributor:
James Maude

Backdoored CCleaner could compromise millions of users

The popular PC cleanup tool, CCleaner has been hijacked by hackers in the latest widespread malware attack. The hack, identified by security researchers at Cisco Talos, found that anyone who downloaded or updated the CCleaner app between mid-August to mid-September also potentially downloaded malware without realising.

Continue reading
Date published
8/31/2017 12:46:46 PM
Contributor:
Andrew Avanessian

CeX sees 2 million customer details compromised

CeX, the second-hand electronics, and video games retailer has reportedly had the details of two million customers compromised by hackers. The information stolen included names, addresses, email addresses and some phone numbers, as well as a small number of encrypted credit card details.

Continue reading
Date published
8/3/2017 12:32:54 PM
Contributor:
Andrew Avanessian

Endpoint security success…balance is key!

So many times, I have seen security become an afterthought, rather than being an integral part of a design from the outset. Good security design is not always visible and therefore often not very well understood by the c-suite, who pile on the pressure to release systems or improve user freedom.

Continue reading
Date published
7/6/2017 10:40:38 AM
Contributor:
Chris Collingridge

Stop monkeying around: Go guerrilla

As an industry, people who develop software and online services have taken great leaps over recent years in developing attractive, usable products. But there can still be a reluctance to test things early and often with users – especially if you’re developing for internal or enterprise users.

Continue reading
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 28