Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

How automation will impact the future of IT skills

In casual conversation, artificial intelligence (AI) and automation are talked about as if they’re interchangeable, but this doesn’t reflect reality. Automated processes serve the sole function of automating specific tasks without human intervention. AI, on the other hand, is the simulation of actual human intelligence to work on tasks independently.

Despite the clear distinction between AI and automation, a...

By Sascha Giese, 30 September 2019, 0 comments. Categories: Applications, CIO, Cloud , Data & Analytics, Productivity.

How to get ahead as a CIO: Why transformation alone isn’t enough

In the past 24 months, many CIOs have begun the strategic transition of steering their organisation through the digital transformation journey. Becoming an enabler for the business is a relatively straightforward evolution, but what the business really needs is the tech savvy visionary. However, if, as a CIO, you are placing exclusive focus on digital transformation, you risk missing the bigger picture. The CIOs who have one eye on delivering more than digital transformation are moving to establish themselves...

By Robert Rhame, 27 September 2019, 0 comments. Categories: CIO, Enterprise Mobility, Productivity.

Why businesses need to develop a Matrix Mindset

Digital technology is a pervasive force that impacts every part of our existence. It will be embedded in everything – our bodies, our houses, the cities and world we live in – all with the capability to augment our daily lives.

A key component of this will be a synergistic combination of cloud and AI, part of what LEF defines as “The Matrix”, creating an intelligent, pervasive infrastructure that will increasingly be able to perform just about everything that companies and individuals...

By Glen Robinson, 26 September 2019, 0 comments. Categories: CIO.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.

One in five CISOs reports directly to the CEO today as organisations focus more on IoT and cloud

The latest study from Wipro has found that one in five CISOs are now reporting directly to the CEO, with cloud and Internet of Things (IoT) strategies increasingly on the radar.

Wipro’s latest study, titled “2019 State of Cybersecurity Report”, is based on three months of primary and secondary research, including surveys of security leadership, operational analysts, and 211 global organisations across 27...

By Enterprise CIO, 04 September 2019, 0 comments. Categories: CIO, Research, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC) professionals across enterprise...

By James Bourne, 02 September 2019, 0 comments. Categories: CIO, Collaboration, Data Loss, Employee Education, Employees, Research, Security.

Tackling cybercrime one step at a time: How businesses can stay connected and protected

As concern around cyber security continues to rapidly grow and threats become increasingly complex, the challenges faced by businesses are mounting considerably. In fact, when assessing the cyber security risk, it is no longer a question of if a business will be attacked, but when.

Today, significant cyber security breaches are becoming commonplace in newspaper headlines, with British Airways among one of the latest organisations to face the consequences of a data breach. This resulted in around 500,000...

By Shani Latif, 22 August 2019, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Want the benefits of blockchain but easy implementation with it? The answer may be here

Blockchain has been around for a little over a decade now. Yet while most IT folk understand that it’s about transaction security, business decision-makers have still to tune in. Ultimately, a hesitant business stance towards adopting blockchain has left many organisations with substandard, costly and centralised data security systems.

One reason organisations have been hesitant to even trial blockchain, is the perceived cost of experimentation, development and implementation. But this cost has fallen...

By Chris Obdam, 16 August 2019, 0 comments. Categories: Applications, CIO, Development, RMAD.