Computer Security, Internet security, Cybersecurity, Web filtering, IT Protection

Computer security, also known as cybersecurity, is the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection.

RSS

Renowned cybercrime journalist Brian Krebs announced as speaker at BSI International Cyber Resilience Exchange

1 Renowned cybercrime journalist Brian Krebs announced as speaker at BSI International Cyber Resilience Exchange

BSI’s global centre of excellence for Cybersecurity and Information Resilience has announced cybercrime investigative journalist, Brian Krebs as a speaker at the BSI International Cyber Resilience Exchange. The Exchange takes place at The Convention Centre Dublin on 26 March 2019.

CySure partners with Frost Solutions to deliver cyber security services in South Africa

2 CySure partners with Frost Solutions to deliver cyber security services in South Africa

Cyber security specialist CySure Ltd has appointed Frost Solutions as a specialist value added reseller partner in South Africa. Frost Solutions specialises in delivering IT services to the small and medium size enterprises (SMEs) market and has added CySure’s information security management system, VOSO to its product and service portfolio.

Arcserve predicts public clouds lose the battle for DR budgets; Names the trends that will rule data protection in 2019

3 Arcserve predicts public clouds lose the battle for DR budgets; Names the trends that will rule data protection in 2019

2018 was one of substantial change in data protection as organisations grappled with new privacy regulations, exceedingly sophisticated ransomware attacks, and cloud-first disaster recovery strategies that ushered in unexpected costs and heightened risks of data loss. Data protection provider Arcserve, LLC names three predictions for 2019 and their impact over the next 12 months:

Blockchain incubator Adel launches decentralised, anonymous and encrypted file transfer service

4 Blockchain incubator Adel launches decentralised, anonymous and encrypted file transfer service

Blockchain technology incubator Adel has announced the alpha launch of AdelPoint. This is Adel’s first released project since its launch in December 2016.

Cylance narrows the cybersecurity skills gap with Virtual CISO

5 Cylance narrows the cybersecurity skills gap with Virtual CISO

Cylance Inc., the provider of AI-driven, prevention-first security solutions, has announced the availability of its virtual chief information security officer (vCISO) service, a program designed to provide organisations with critical technology and security resources that support next-generation security architectures and offer robust staff augmentation.

Major criminal threats to retailers at Christmas

6 Major criminal threats to retailers at Christmas

This Christmas the risk to retailers’ margins from theft is greater than ever before, according to the Lodgic Intelligence Centre.

A10 Networks introduces multi-cloud Secure Service Mesh solution for applications deployed in Kubernetes

7 A10 Networks introduces multi-cloud Secure Service Mesh solution for applications deployed in Kubernetes

A10 Networks, the provider of intelligent and automated cybersecurity solutions, has announced availability of the A10 Secure Service Mesh solution for applications deployed in open-source Kubernetes container environments.

CySure partners with digital consultants Rubitek for cyber security

8 CySure partners with digital consultants Rubitek for cyber security

Cyber security specialist CySure Ltd has partnered with Rubitek as a digital consulting re-seller. Rubitek has added CySure’s Virtual Online Security Officer (VOSO) to its digital consulting offering to support businesses worldwide with their cyber security.

Seclore increases the security of emails and attachments with advanced automation capability

9 Seclore increases the security of emails and attachments with advanced automation capability

Seclore has expanded its Seclore Email Protector. The new Email Auto-Protector automatically attaches persistent, granular usage controls to sensitive emails and attachments based on predefined rules. The solution offers two key ways to automate email protection.

Pulse Secure expands Zero Trust Security for IoT with firewall auto-provisioning and behavioural analytics

10 Pulse Secure expands Zero Trust Security for IoT with firewall auto-provisioning and behavioural analytics

Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, today announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories.

Computer Security

Computer security is the protection of computer systems and information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:

  • Network security: This is the protection of computer networks from unauthorized access or attack. It includes things like firewalls, intrusion detection systems, and security policies.
  • Application security: This is the protection of software applications from vulnerabilities that could be exploited by attackers. It includes things like code review, penetration testing, and security testing.
  • Data security: This is the protection of sensitive data from unauthorized access, use, disclosure, or destruction. It includes things like encryption, access control, and data backups.
  • Operational security: This is the protection of computer systems from threats that arise from human error or negligence. It includes things like user training, incident response procedures, and security awareness.

Cybersecurity

Cyber security is the practice of protecting computer systems and networks from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many different types of cyber security threats, but some of the most common include:

  • Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, including viruses, worms, trojans, and ransomware.
  • Phishing: Phishing is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source. The goal of phishing is to trick the recipient into clicking on a malicious link or providing personal information.
  • Data breaches: A data breach is an incident in which sensitive data is exposed to unauthorized individuals. Data breaches can occur due to a variety of factors, including hacking, human error, and system vulnerabilities.

Cyber security is a critical issue for businesses of all sizes. In today's digital world, businesses rely on their computer systems and networks to operate. A cyber attack can have a devastating impact on a business, including financial losses, reputational damage, and loss of customer trust.

Cyber security is an ongoing challenge, but by taking steps to protect themselves, businesses can help to mitigate the risks of cyber attacks.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter