For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

What the consolidation of phishing awareness training means for CIOs

Last November I was asked for my 2018 cybersecurity predictions, and I was most confident about one. That projection: the phishing awareness training market was primed for consolidation.

Fast-forward just a few months and my inner genie certainly appears to be out of the bottle. By January 3, Barracuda Networks had announced its acquisition of Phishline, a social engineering training platform, for an undisclosed amount. Shortly thereafter, Proofpoint...

By Eyal Benishti, 26 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Security.

Why data should be a strategic asset available to all employees

The question of who owns and controls our data has been in the press a lot these past weeks. But while Cambridge Analytica and Facebook both have serious questions to answer, in other sectors – including work, education, retail and energy – data harvesting is empowering organisations.

While analytics teams have traditionally been made up of data scientists tasked with gathering,...

By Robert Dagge, 25 April 2018, 0 comments. Categories: Big Data, CIO, Data & Analytics, Employees.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Why IT directors need to exercise a duty of care to support employees in an emergency

Businesses have procedures in place to protect employees travelling overseas to remote or possibly dangerous countries, but recent terror attacks in the UK have brought the health and safety issues companies face abroad to the home front.  IT directors now have a growing responsibility to ensure the safety and security of their workforce in the event of an emergency, regardless of their location.

The challenge for IT teams is finding technology that offers an effective means of communicating and...

By Raymond Kenney, 10 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Enterprise Mobility.

Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

VMware boosts Workspace ONE features with greater security and automation

VMware has added new features around its Workspace ONE platform to include data-driven intelligence and predictive security.

The new features include Workspace ONE Intelligence, a cloud-based service which integrates with the main platform to aggregate users, apps, networks and endpoint data, as well as the Workspace ONE Trust Network, which combines the security of the primary platform with best practices from featured partners. The seven companies combining with VMware on this are Carbon Black, CrowdStrike,...

By James Bourne, 23 March 2018, 0 comments. Categories: App Platforms, Data & Analytics, Enterprise Mobility, Security.