SysArmyAug 29, 20192 minUsing risk scoring, a method used by financial services for management of cyber risks.
SysArmyAug 28, 20191 minFacebook misled investors about misuse of data - Food for Thought for our Securities Regulators
SysArmyAug 28, 20191 minBacteriophage - Is it possible for software researcher to develop an equivalent of this?
SysArmyAug 27, 20191 minYouTube accused of collecting information on minors without parental consents
SysArmyAug 27, 20191 minThe courts in the UK are deciding on the penalty against an organisation that suffered a data breach
SysArmyAug 26, 20191 minAre the stakeholders of the critical industries doing enough in preparing against cyber attacks?
SysArmyAug 26, 20191 minBus booking portals should be proactive in cybersecurity to protect its customers data
SysArmyAug 23, 20191 minSystems at Airports operations disrupted on both sides of the world, a week apart.
SysArmyAug 19, 20191 minA cyber espionage campaign dubbed ‘Lucky Elephant’ mostly used against South Asian governments
SysArmyAug 16, 20192 minBroadcom, a manufacturer of semi conductors acquiring Symantec, an end point security specialist?
SysArmyAug 8, 20192 minNOKIA disowned the comments made by its Chief Technology Officer (CTO) on Huawei
SysArmyAug 5, 20192 minAllegation of Telco Hijacking and Detouring Internet Traffic - Is it because they are from China?
SysArmyAug 5, 20192 minDoes cyber criminals need to have a sophisticated set up to conduct their hacking activities? Nahhh