The types of cyber security tools currently in use among organizations and individual users vary from those that help to block intrusion to the ones that control network access and protect endpoint.
Blog
In light of sophisticated cyber attacks, how can you protect your business?
The attack on UK telecommunication provider TalkTalk in the past week has shed some light on the increasingly sophisticated tactics used by hackers. Initial report cited a denial of service attack, but also indicated a loss of sensitive data, which was rare for a DDoS type of breach.
Microsoft designs new launcher for Android devices
When Microsoft released the Android and iOS versions for its digital assistant Cortana, some have speculated that the software has finally given in to its rivals Google and Apple. As a matter of fact, it was less an admission of defeat than a strategic move to adopt multiple platforms for a wider reach of users.
Facebook is the new political platform: how presidential bets are targeting voters
Whether it is against your will or you approve of it, the United States’ presidential candidates are turning to Facebook to reach the mass of voters who have flocked to the social networking site for information.
MasterCard has a grand plan for IoT-enabled payment systems
The burgeoning Internet of Things has something good to offer to consumers: you will soon be able to pay your purchases using only your wearables, jewelry, and even your clothes.
Chip and PIN card system at the mercy of hackers
The Chip and PIN card system is the latest innovation coming to your credit and debit cards.