6.4 billion fake emails a day: How can you avoid the risks
6.4 billion fraudulent emails are sent every day. Here we explain how you can avoid the risks related to a fake emails in your business.
The future of security lies in quantum computing
The future of computing is in quantum mechanics, and the sector that has most to gain from quantum computing is the security sector.
5 ways to tell if you’re a victim of identity theft
The longer an identity thief goes undetected, the more damage they can do to your finances and reputation.
Panda Adaptive Defense 360 earns IT Pro Editor’s Choice Award.
IT Pro, one of the UK’s most influential tech websites, has awarded Panda Adaptive Defense 360 5 stars in its latest review of the cybersecurity suite.
North Korean hacker officially charged for the WannaCry attacks
Park Jin Hyok, a North Korean hacker, has been charged by the US Department of Justice for carrying out the WanaCry attacks, among other cybercrimes.
What is the difference between sandboxing and honeypots?
Today we take a look at two strategies that are very common in the sector: honeypots and sandboxing, two IT risk prevention strategies.
GDPR lands at British Airways: How did the hackers manage to get in?
The only way to avoid paying the economic sanctions of GDPR is to keep these security breaches from happening. Find out how to protect your company.