Select Page

Latest News

Data Harvesting Opens the Door to More Ransomware Attacks

We all know about the much publicised 2014 Yahoo hack that saw 500 million accounts compromised, wiping $350 million off the value of the company. In fact, it wasn’t a […]

Read more

RUAG completes acquisition of cyber security company Clearswift

Bern (CH), Theale (UK); 23.01.2017. RUAG Defence has successfully completed the acquisition of the British Cyber Security specialist Clearswift. Clearswift announced in December 2016. This acquisition enables RUAG to enhance key […]

Read more

RUAG is aquiring Cyber Security specialist Clearswift

Bern (CH), Theale (UK); 20.12.2016. The RUAG Defence division is acquiring the British Cyber Security specialist Clearswift. With this acquisition, RUAG is making a significant investment in the expansion and long-term […]

Read more

GDPR: How to Prepare for a Borderless World of Data Privacy

One of the most influential business books of the early 21st century is Thomas Friedman’s The World is Flat: A Brief History of the Twenty-First Century. He argued that the world […]

Read more

End of Ransomware Attacks

Ransomware and morphed forms of embedded malware are creating havoc for IT security organizations. Weaponized invoices, resumes and other malicious documents are distributed through compelling social engineering campaigns to evade […]

Read more

Document Sanitisation and Redaction Safety Net for the Forgetful User

Policies written. Tools provided. Training conducted.  As IT leaders, you have sufficiently enabled your users to properly sanitise and redact their documents before sharing outside the organisation, but what happens […]

Read more

The compliance clock is ticking. Start preparing for the EU GDPR now.

The European Union General Data Protection Regulation (EU GDPR) raises the bar on privacy of personal data. It requires organizations, big and small, who trade with the EU to really […]

Read more

10 shocking malware and ransomware statistics…

“Malware Mania” is back with a vengeance creating havoc for organizations of all sizes and in all industries. Cyber criminals have morphed their attack methods with the resurgence of macro […]

Read more