dcsimg

Everything You Need to Know About China’s Cybersecurity Law

In this article, we'll  answer some of the most common questions about the CSL, and make compliance goals as clear as possible. … [Read more...]

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches. … [Read more...]

‘We need bigger cyber security budgets’, organisations say in new survey

Organisations need to invest more money into cyber security defences if they are to fight back against the growing threat of data breaches, an Ernst & Young survey has found.  According to the professional services firm’s Global Information Security Survey 2018–19, 87% of respondents said they don’t have the budget to deal with … [Read more...]

MiFID II: What IT and Compliance Teams Need to Know

MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards. … [Read more...]

The Biggest Security Risks of Using 3rd Party APIs

Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.   … [Read more...]

A week in security (April 8 – 14)

Last week on Labs, we said hello to Baldr, a new stealer on the market, we wondered who is managing the security of medical management apps, discussed the different perceptions of personal information, and we looked at fake Instagram assistance apps found on Google Play that are stealing passwords. Other cybersecurity news German pharmaceuticals giant Bayer says it has been hit by malware, … [Read more...]

What’s Up with Wi-Fi 6?

Wi-Fi 6 is almost here and although it boasts some significant increase in speeds, it’s main attraction will be connecting and securing more devices at once since we are connecting more IoT and mobile devices to networks. … [Read more...]

Podcast: What is DevSecOps?

DevOps has been the go-to method over the past several years for fast software development lifecycles. But just like testing is an integral part of app development, security is also an integral part as well. That's why the term DevSecOps was coined. … [Read more...]

Peer-to-Peer File Sharing: How to Protect Your Sensitive Data

Efficient collaboration and peer-to-peer file sharing are important for any job, but you don't want to do it in a way that leaves data unprotected. … [Read more...]

UK Government Orgs. Aren’t Updating Email Security, Survey Finds

Just 28% of gov.uk domains have implemented new email security standards from the the Domain-based Message Authentication, Reporting and Conformance (Dmarc) protocol, according to a study from data security company Egress … [Read more...]