Posted on 27 June 2023 by Mathay Kahraman
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized users access to company systems. With the growth in AI tools recently, phishing attempts are […]
Posted on 17 May 2018 by Thales DIS
We use cloud applications everywhere, across many different facets of a company; expenses, project workflows, product development and sales and marketing. Applications are often linked to a company’s central system and if left insecure, end up serving as a gateway for malicious outsiders. They are also increasingly the targets of cyber-attackers to gain privileged access, […]
Posted on 02 August 2016 by Thales DIS
The summer of sport in Brazil is almost here and the IoT is set to play a bigger role than ever before.
Posted on 26 September 2014 by Thales DIS
As the leader of a company, the CEO has access to the most private, valuable information from corporate strategy and financial results to sensitive employee data. Few will argue with the fact that the CEO is someone who needs advanced security.
Posted on 18 April 2013 by Thales DIS
Pick up any magazine or read any online publication and I guarantee you’ll see a reference to the Big Data phenomenon. And why wouldn’t you? The statistics speak for themselves: every day we create 2.5 quintillion bytes of data and IBM claims that 90% of the data in the world today has been created in […]
Posted on 27 February 2013 by Cecile Eurendjian
Hola! Here we are in the heart of Mobile World Congress 2013. What we can observe so far is that innovation is in full swing fostering discoveries and development and it really seems endless. The mobile ecosystem is expanding at lightning speed, challenging everyone to adapt at the same pace. So as not to get […]