Modern Listing Example
The big picture of security planning for major sporting events: A holistic approach
More than 135 major sporting events have been held over the past 100 years, equating…
Global logistics: Securing the supply chain
Ensuring the safe delivery of more than 308 million packages globally each year is no…
Radicalisation process “a cultural and religious insight” [Part III]
Click to read Part I or Part II of this article Using her own experience as…
The paralysis over Syria
The refugee crisis cannot be resolved without tackling Syria’s conflict There is turbulence in the…
Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…
Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation
Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep…
Akamai Revolutionises Bot Management
Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of…