Phishing Attacks: How to Avoid Them
Phishing attacks are the most common type of cyber-attack method today, with new mutations and versions appearing every day.
Cloud-enabled Operations: Secured with CASB
It’s clear: today’s “on-the-go” workforce is constantly looking for ways to work more efficiently and effectively, and the ever-expanding number of produc …
Six Best Practices for Managing a Virtual Team
A virtual team is a group of individuals who work across time, space and organizational boundaries with links strengthened by webs of communication technology.
RFA and Seclore Announce Strategic Partnership to …
RFA and Seclore Announce Strategic Partnership to Deliver Data-Centric Security to Hedge Funds, Private Equity Funds, Investment Management Companies and Law Firm …
Don’t give away your Apple ID password!
Cybercriminals are always coming up with new ways to steal information. The latest comes in the form of a popup asking users to enter their Apple ID password. And …
Blockchain – What’s it all about?
Why is Blockchain the latest buzzword? What is it, and do you need it in your alternative investment firm?
37% organisations around the world are still unsur …
A recent study by a well-known Perimeter security firm of 1,600 organisations also found that only 10% believed they were 100% prepared for the regulations to pas …
37% organisations around the world are still unsur …
A recent study by a well-known Perimeter security firm of 1,600 organisations also found that only 10% believed they were 100% prepared for the regulations to pas …
Further Scrutiny of Cybersecurity Policies and Pro …
The UK government has opened a consultation on the Network and Information Systems (NIS) Directive from the European Commission, which aims to increase the securi …
Considering Cloud?
Firms which may be considering a move, partial or otherwise, to cloud-based services, will need to work through a checklist to ensure all the bases are covered.