Five key ways machine learning can thwart phishing attacks

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in 2020. 60% of IT leaders believe that phishing is the most significant mobile security threat faced by their organization, according to...

Four key steps to transform cybersecurity into a business enabler

Cybersecurity has traditionally been viewed as the department of ‘no’ – thought to be cautious, restrictive, and restrained. COVID-19 demonstrated this to be far from the truth. When physical offices had to suddenly transform into digital, virtual hubs, cybersecurity became an essential part of the innovation process, rather than a roadblock.

Despite this, recent research shows that fewer than 25% of business leaders view security as a proactive enabler of digital...

Seeking the answers to today’s toughest enterprise endpoint security questions

Enterprises who are increasing the average number of endpoint security agents from 9.8 last year to 10.2 today aren’t achieving the endpoint resilience they need because more software agents create more conflicts, leaving each endpoint exposed to a potential breachOne in three enterprise devices is being used with a non-compliant VPN, further increasing the risk of a breach60% of breaches can be linked to a vulnerability where a patch was available, but not applied. Windows 10 devices in...

What are the main challenges chief procurement officers face today?

As we move towards a new world of business, post the pandemic, without a doubt COVID-19 has severely disrupted supply chains on a global scale. Procurement leaders are having to maintain business operations, fulfill urgent demands, and mitigate supplier challenges against a backdrop of significant disruption to their teams and their partner ecosystem.  Moving forward resilience will be the watchword and as CPOs start to think about the short and medium-term needs of the...

10 ways AI is improving new product development

Startups’ ambitious AI-based new product development is driving AI-related investment with $16.5B raised in 2019, driven by 695 deals according to PwC/CB Insights MoneyTree Report, Q1 2020. AI expertise is a skill product development teams are ramping up their recruitment efforts to find, with over 7,800 open positions on Monster, over 3,400 on LinkedIn and over 4,200 on Indeed as of today. One in ten enterprises now uses ten or more AI applications, expanding the Total Available...

Assessing network resiliency during the pandemic: How the telcos have held up

Think about what has become a common scenario: you’re at home working throughout the day, probably connected to the internet for long stretches. Because you’re working remotely, you’re asking more of the broadband capacity than usual, running video conferencing sessions with different parts of the world, screen sharing and sending large files.

Maybe your partner is in the same boat, and it would be understandable were you both to be grabbing more network bits by listening to...

How to keep software licence management under control: Microsoft, Oracle, SAP, and more

It is hard to run and set up IT systems without solutions from large players. Their offerings are now industry standards and make financial sense, with system compatibility and employee skills the main reasons for their success. While there are many advantages for using solutions from Microsoft, IBM and the like, they come with many strings attached. Hundreds of pages of clauses and terms make their licences hard to manage. Most notably in large organisations, managing licenses requires...

Why cybersecurity remains a key problem across the business

Bottom line: Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organisation and the need to keep the business running, starting with secured endpoints. Enterprises who have taken a blank cheque approach in the past to spending on cybersecurity are facing the stark reality that all that spending may have made them more vulnerable to attacks. While cybersecurity spending grew at a Compound...

Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy. 55% of breaches originate from organized crime groups.Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last...

BlackBerry protects ‘upwards of 96%’ of all cyberthreats, says Frost & Sullivan

A report from Frost & Sullivan has praised BlackBerry's security capabilities, saying the company can protect 'upwards of 96%' of all cyberthreats as well as all IoT endpoints.

The report assessed the cyberthreat landscape more generally and found that comprehensive endpoint-based security can protect up to 97% of attacks. This percentage is likely to increase due to the growing number and importance of IoT devices. Across industry, the next five years are likely to see at...