For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan Van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Why C-suite expertise does not always translate to InfoSec awareness

Their experience and judgement has led C-suite executives to the head of their organisations – yet according to new research from Bitdefender, these employees are most likely to expose the company to a major cyberattack.

According to the study, which polled 250 CIOs, CISOs and CSOs, more than two in five (41%) perceive their C-suite colleagues as InfoSec averse. A similar number (42%) say they are most concerned with a loss of customer and stakeholder trust with data breaches, while more than a quarter...

By James Bourne, 20 March 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employees, Security.

Why cryptocurrency is the newest DDoS battlefield

It is hard to pretend that cryptocurrency is still a niche fad. In January, James Altucher, entrepreneur and editor of the Altucher report, predicted to CNBC that cryptocurrencies will replace some or all paper money in the long run. He believes enterprises will eventually adopt the Bitcoin as the cryptocurrency begins to rise to prominence. And it’s not just finance and tech getting in on the cryptocurrency boom. Celebrities such as 50 Cent revealed recently that he had $7 million in Bitcoin that he...

By Ronald Sens, 05 March 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Enterprises fail to achieve ‘transformational’ level of maturity for data and analytics

A total of 91% of enterprises throughout the world have failed to attain a "transformational" level of maturity when it came to data and analytics, according to a new report from Gartner.

The survey that polled 196 organisations worldwide revealed that although CIOs are considering data and analytics to be their top investment priority in the recent years,  60% of respondents have placed themselves in the lowest three levels on Gartner’s five-level maturity scale for data and analytics...

By Enterprise CIO, 20 February 2018, 0 comments. Categories: Big Data, CIO, Data Loss, Enterprise Mobility.

Mobile mitigations for Meltdown and Spectre: A guide

Meltdown and Spectre are two critical vulnerabilities recently identified in modern processors. These vulnerabilities can allow unprivileged users to access memory belonging to other processes, including the kernel.

Much of the initial coverage of these vulnerabilities centred on desktop, server, and cloud systems, but they affect mobile devices as well. Apple, Google, Linux distributions, and Microsoft are now releasing patches to mitigate these issues.

How the exploits work

Meltdown and Spectre are hardware...

By Ojas Rege, 22 January 2018, 0 comments. Categories: App Platforms, Data Loss, Enterprise Mobility, Security.

How to combat the risks of shadow IT with secure messaging

With the increasingly frequent and damaging security breaches in the news today, the natural tendency for IT professionals is to run back to the data centre and patch, upgrade, test and make sure that all business data and, therefore, the corporate reputation, is safe. While corporations continue to lock down the enterprise and its users, they often forget one important factor – employees have their own powerful computing devices, their mobile phone.  

Generally, employees will stop at nothing to...

By Galina Datskovsky, 24 October 2017, 0 comments. Categories: CIO, Cloud , Collaboration, Data Loss, Employees, Enterprise Mobility.

WhatsApp and WinZip among most blacklisted enterprise iOS apps, says Appthority

WhatsApp, WinZip, and Pokémon GO were the top iOS apps blacklisted by mobile security teams, according to a new report from enterprise mobile threat protection provider Appthority.

The study, the company’s latest quarterly Enterprise Mobile Security Pulse Report, found iOS apps were most likely to be given the boot due to data leakage for sending SMS messages, tracking location, and sending data unencrypted.

For Android – whose biggest casualties were Where’s My Droid Pro and an...

By James Bourne, 03 October 2017, 0 comments. Categories: Applications, Data Loss, Enterprise Mobility, Malware, Security, Social.