Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan Van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

MobileIron expands partnership with Lenovo to include new offering

Enterprise mobility management (EMM) software provider MobileIron has announced an expansion of its partnership with Lenovo, aiming to create a unified hardware and software experience for organisations.

Last year’s Mobile World Congress saw the first announcement of the partnership, whereby Lenovo customers could purchase MobileIron’s security and management platform alongside...

By James Bourne, 16 April 2018, 0 comments. Categories: Enterprise Mobility, Productivity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

How gamification and automation can change your organisation’s cybersecurity stance

Gamification could be the key tool to instil a better cybersecurity posture in your organisation – with gamers potentially representing the next generation of threat hunters.

That is the primary finding from a new report by McAfee which polled 950 cybersecurity managers at organisations with 500 or more employees. The study, titled ‘Winning the Game’, argues popular security competition games, such as capture the flag, make sense from an inter-organisational perspective. Four in 10 companies...

By James Bourne, 09 April 2018, 0 comments. Categories: Employees, Gamification, Security.

Qualys acquires 1Mobility for enterprise mobility management boost

California-based cloud-based security firm Qualys has acquired the software assets of Singapore-based 1Mobility, allowing it to fully integrate the latter’s solutions in its cloud platform and mobile applications.

The move allows Qualys to help enterprises develop and continuously update an inventory on all available mobile operating systems.

The integration will also allow enterprises to continuously assess their security and compliance posture, while quarantining devices that are compromised or...

By Enterprise CIO, 06 April 2018, 0 comments. Categories: BYOD, Cloud , Enterprise Mobility, Security.

Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

VMware boosts Workspace ONE features with greater security and automation

VMware has added new features around its Workspace ONE platform to include data-driven intelligence and predictive security.

The new features include Workspace ONE Intelligence, a cloud-based service which integrates with the main platform to aggregate users, apps, networks and endpoint data, as well as the Workspace ONE Trust Network, which combines the security of the primary platform with best practices from featured partners. The seven companies combining with VMware on this are Carbon Black, CrowdStrike,...

By James Bourne, 23 March 2018, 0 comments. Categories: App Platforms, Data & Analytics, Enterprise Mobility, Security.

Why C-suite expertise does not always translate to InfoSec awareness

Their experience and judgement has led C-suite executives to the head of their organisations – yet according to new research from Bitdefender, these employees are most likely to expose the company to a major cyberattack.

According to the study, which polled 250 CIOs, CISOs and CSOs, more than two in five (41%) perceive their C-suite colleagues as InfoSec averse. A similar number (42%) say they are most concerned with a loss of customer and stakeholder trust with data breaches, while more than a quarter...

By James Bourne, 20 March 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employees, Security.

Why enterprises are losing by default to cybercriminals

In sport, if one team does not have enough players to field a team they lose by default. This is the easiest way to win for the victorious party. Not a drop of sweat was produced and there was no risk of injury or embarrassment. The only thing the victors had to do was show up and they get to take home the trophy.

On the other side, this is also the most disappointing loss for the losing party. No matter what their reason is for not showing up, they still...

By Alastair Hartrup, 13 March 2018, 0 comments. Categories: CIO, Security.

Why cryptocurrency is the newest DDoS battlefield

It is hard to pretend that cryptocurrency is still a niche fad. In January, James Altucher, entrepreneur and editor of the Altucher report, predicted to CNBC that cryptocurrencies will replace some or all paper money in the long run. He believes enterprises will eventually adopt the Bitcoin as the cryptocurrency begins to rise to prominence. And it’s not just finance and tech getting in on the cryptocurrency boom. Celebrities such as 50 Cent revealed recently that he had $7 million in Bitcoin that he...

By Ronald Sens, 05 March 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.