cybersecurity-news

User experience: A key to effective vulnerability management

Vulnerability management has always been hard, with patches from myriad companies that must constantly be sorted by version and severity. It’s espec...

5 reasons why GDPR was a milestone for data protection

The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens It was May 25th, 201...

429 Error

We have detected unusual activity from your IP address You can continue browsing our website for the next 20 minutes if you pass the CAPTCHA challeng...

Cryptocurrency: secure or not? – Week in security with Tony Anscombe

When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices...

Bank refuses to pay ransom to hackers, sends dick pics instead

I’m not sure if it would be enough for me to switch bank accounts, but I have something of a sneaking respect for the Bank of Zambia. As Bleeping C...

5 Tips To Improve Mobile Device Security to Protect Your Enterprise

Mobile device security is a growing concern for many organizations, but you can make your enterprise more secure with simple tips. Read on to learn ho...

AccessQuint Access360