In Conversation with Jack O'Reilly; Sales Director - Dell

In Conversation with Jack O'Reilly; Sales Director - Dell

A qualified and proficient Sales Director - Business Development at Dell EMC OEM & IoT Solutions, Jack has over 12 years professional sales experience at management level in the information technology

Watch the full video interview below. ... Read more...

Cybersecurity concerns for industrial control systems and critical infrastructure

Cybersecurity concerns for industrial control systems and critical infrastructure

Cliff Wilson, Associate Partner in the IBM Security Business Unit, on the major cybersecurity vulnerabilities around legacy industrial control systems and critical infrastructure.

Tim Compston, Guest Features Writer at SecurityNewsDesk, sits down with Cliff Wilson, an Associate Partner in the IBM Security Business Unit UK and Ireland, for an insight into the major cybersecurity vulnerabilities around legacy industrial control systems a... Read more...

No More Ransom

No More Ransom

No More Ransom is an international scheme to stem payments to criminals who use ransomware to extort money from individuals and enterprise.

“The first concerted international effort to stem payments to criminals running ransomware rackets has successfully cut the income to targeted gangs in the first few months of operations,” researchers responsible for the scheme have told Paul Peac... Read more...

Biometric Vulnerabilities and Fixes

Biometric Vulnerabilities and Fixes

Take a look at Biometric vulnerabilities and fixes with some emerging biometric technologies including a unique authentication capability from iProov

Just as some banks begin to move towards using facial recognition as a method for customers to log into their accounts, reports are coming in about how it can be spoofed using the new iPhone “Live Photo” feature. Philip Ingram from Security News D... Read more...

Data Security - Is End-to-end Encryption The Answer?

Data Security - Is End-to-end Encryption The Answer?

Tim Compston from SecurityNewsDesk looks at data encryption

Tim Compston, Features Editor at SecurityNewsDesk and SecurityMiddleEast.com, considers where end-to-end encryption fits into the mix in the quest by organisations to stop damaging data breaches. The technology we use and volume of data we generate is chan... Read more...


Top