Tackling cybercrime one step at a time: How businesses can stay connected and protected

As concern around cyber security continues to rapidly grow and threats become increasingly complex, the challenges faced by businesses are mounting considerably. In fact, when assessing the cyber security risk, it is no longer a question of if a business will be attacked, but when.

Today, significant cyber security breaches are becoming commonplace in newspaper headlines, with British Airways among one of the latest organisations to face the consequences of a data breach. This resulted in around 500,000...

By Shani Latif, 22 August 2019, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

How predictive analytics can help manage unforeseen challenges in the supply chain: A guide

In the UK, Brexit has prompted businesses of all sizes to weigh up how any number of potential outcomes may impact their operations, and how they can effectively identify and manage threats to their business. In fact, recent research by Vuealta reveals that uncertainty over Brexit has resulted in more disruption to supply chains in the last five years than natural disasters and cyberattacks combined.

By Martin Clothier, 14 August 2019, 0 comments. Categories: Big Data, Data & Analytics, IoT, Mobile Analytics, Productivity.

Innovations in analytics and BI: The top trends to look out for in 2020

As companies strive for success in the digital age, it’s essential that they keep abreast of the innovation happening in the world of analytics and business intelligence (BI). By understanding the trends that are set to take the ever-evolving field of analytics by storm, organisations can be one step ahead in the race to innovate.

That’s why TIBCO Software conducted a global survey on...

By Shawn Rogers, 13 August 2019, 0 comments. Categories: Big Data, Data & Analytics, Research.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Why passwords are the weakest defence in a Zero Trust world

  • 90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG.
  • 86% of CIO, CISO and Security VPs would abandon password authentication if they could.
  • Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for replacing passwords.
  • There is a direct correlation between the number of times a user authenticates and the number of user access problems that need to be addressed.

These and many other fascinating insights...

By Louis Columbus, 24 July 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Protecting your organisation from phishing scams: A guide

The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams back in the spotlight, as this was an integral part of the company’s data breach. Unlike many other forms of cyberattack, phishing scams go after your customer or employee data, including credentials like passwords, financial details or sensitive personal information. This data can then be used or sold on for malicious intent, from identity theft or false transactions, to brute force or...

By Elad Schulman, 19 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

How artificial intelligence will benefit organisations – from processes to productivity

Despite previous doubts, AI is becoming something that enterprises see as having a positive impact as it makes human lives easier. In field service, for example, where you have 1,000 tasks and 100 field service technicians available, AI quickly and efficiently determines which technician to send where. With all the permutations and combinations, this is not a task for humans!

AI can access a...

By Paul Whitelam, 18 July 2019, 0 comments. Categories: Applications, Data & Analytics, Development, Enterprise Mobility.

Why AI cybersecurity is a leap forward in threat intelligence

No sector is immune from cyber attacks and attackers do not discriminate against size of organisation. The objective may be financial or even political, what is certain is that the increasing level of sophistication means that they present some of the most the most strategically significant risks to business today.

Cybersecurity is driven by the need to remain one step ahead of the attacker. As...

By Neil Kell, 11 July 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Data Loss, Security.

Security executives want to push forward a password-free future, finds MobileIron

The password is increasingly becoming an endangered species – and it is an area which vendors focused on Zero Trust Security (ZTS) are becoming increasingly focused. According to a new study from MobileIron, the future of authentication for enterprise services will soon be through mobile devices.

The study, which polled 200 IT security leaders across three continents and at organisations with more than 500 employees,...

By James Bourne, 28 June 2019, 0 comments. Categories: Data & Analytics, Employees, Enterprise Mobility, Security.

How machine learning is helping to stop security breaches with threat analytics

Bottom line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up.

Separating security hacks fact from fiction

It’s time to demystify the scale and severity of breaches happening globally today. A commonly-held misconception...

By Louis Columbus, 27 June 2019, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility, Security.