Automation, orchestration and response: Evolution of incident management

The cybersecurity world is constantly growing. It never stands still, there is always some kind of threat, hack or vulnerability happening, making it nigh on impossible to keep track. Cybersecurity is like a high-stakes game where the bad guys get endless ‘lives’ during an attack and yet a single mistake from the good guys can cause a breach.

Nowadays, everybody uses SIEM (Security Information and Event Management) technology to consolidate alerts from their detection...

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial recognition scanners to help them to identify criminals. Meanwhile, Berlin is testing terrorist-spotting facial recognition...

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password...

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options –...

The shortcomings of single sign-on in the age of information security

Why is it so difficult for companies to properly manage employee access to the online tools and services they are using? Here, we will walk you through the challenges that companies face when it comes to managing employee access, present the most common solutions, and give you an idea of why we need to take a step further than single sign-on.

Managing user access via Excel: Band-Aid on a gunshot wound

Let’s build a simple scenario; a small (by US standards) company of 100 people...

Worldwide security spending to hit $96bn in 2018, says Gartner

Global security spending will hit $96.3 billion in 2018 at an increase of 8% from this year, according to the latest figures from Gartner.

The analyst firm puts security spending for 2018 into five buckets; security services, which comprises the majority (60%) of the overall market, followed by infrastructure protection (18.1% market share at $17.5bn), network security equipment (12.1% share at $11.7bn), consumer security software (4.9%, $4.7bn) and identity access management...

Gemalto’s new platform aims to safeguard enterprise data any time, anywhere

Security provider Gemalto has launched a centralised cloud-based services platform to help enterprises safeguard data, meet compliance mandates, and secure crucial information any time and from anywhere.

According to the company, SafeNet Data Protection On Demand helps resolve issues related to cost and complexity of shielding data by providing a single data security-as-a-service platform. The platform can easily integrate with the existing IT systems, DevOps tools and cloud services...

One in four companies only use passwords as BYOD defence, research finds

Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.

The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).

For those who do use...

Zoho aims to offer more seamless password experience while ensuring security

Zoho, a business cloud software provider, has announced the addition of SAML (Security Assertion Markup Language)-based single sign on support for Vault, its team password manager, to enable greater cloud access.

The theory behind it is straightforward; by accessing Zoho Vault, users can access a variety of other applications directly, while IT has total visibility over user access, tracking, and accountability. Apps supported include Salesforce, Microsoft Office 365, Zendesk and Box,...

New research shows how IT is lax on basic password protection policies

If you’re not enforcing strong passwords on your employees, then you could be at risk of a breach going well into seven figures to remediate it. Yet according to new data from OneLogin, a quarter of companies surveyed don’t even require user passwords to meet a minimum length requirement.

The study, which polled more than 500 US-based executives with influence over their firm’s security systems, also found a minority require users to rotate their passwords monthly...