VPN

Cameyo offers Windows apps delivery on Chrome devices

Cameyo has integrated its virtual app delivery services with ChromeOS to provide IT departments with a way to repurpose older Windows devices. Cameyo said that ChromeOS with Cameyo is designed to enable organisations to deliver any application – from software as a service (SaaS) to legacy apps – over the web, without the need for specific…

Cameyo offers Windows apps delivery on Chrome devices Read More »

Online safety message failing to get through to women

Despite being significantly more affected by discriminatory and hateful content or harassment online, cyber security and privacy advice is failing to cut through to women, with the end result that they tend to be less likely to take steps to protect themselves, according to research conducted at King’s College London (KCL) and the University of…

Online safety message failing to get through to women Read More »

Log4Shell, ProxyShell still among most widely exploited flaws

The National Cyber Security Centre (NCSC), alongside its Five Eyes partner agencies in Australia, Canada, New Zealand and the US, have released details of the 12 most exploited vulnerabilities of 2022, with the likes of Log4Shell and ProxyShell still riding high. The collective said their list served as a warning about the importance of updating…

Log4Shell, ProxyShell still among most widely exploited flaws Read More »

The problem with ‘secure’ messaging

From the shocking scoop of Matt Hancock’s Whatsapp messages to Boris’ reticence to share his messages, the use of secure messaging has become a hot topic. Although it may seem like a new trend, the recent stream of government-centred controversies are far from the first we’ve seen, nor are they the most costly. Last year…

The problem with ‘secure’ messaging Read More »

Future Cyber Threats: The four ‘horsemen of the apocalypse’

As a CISO and cyber specialist, I am often asked what I see as the big cyber threats of the future. Whilst I’m not a fan of crystal ball gazing for its own sake, nevertheless it can be helpful to think about what may be coming – and what we can do about it. So…

Future Cyber Threats: The four ‘horsemen of the apocalypse’ Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top