Global Cyber Alliance launches first cybersecurity development platform for IoT products

The Global Cyber Alliance (GCA) has launched a first-of-its-kind cybersecurity development platform for IoT products, called the Automated IoT Defence Ecosystem (AIDE), which allows small businesses, manufacturers, service providers and individuals to detect vulnerabilities, reduces risks and secure IoT devices against the increasing number of threats in today’s interconnected environment.

GCA ProxyPot, which is a...

By Enterprise CIO, 19 August 2019, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Samsung SDS EMM attains NIAP Common Criteria certification

Samsung SDS America has announced that its enterprise mobility management (EMM) solution has secured a certification which will aid it for clients handling sensitive data.

Its EMM product has advanced to the evaluation stage of National Information Assurance Partnership (NIAP) Common Criteria certification for EMM compliance with the security requirements of the Mobile Device Management Protection Profile (MDM-PP) version 4.0.

By Enterprise CIO, 16 August 2019, 0 comments. Categories: Applications, Enterprise Mobility, Security.

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The report, which tracked...

By Enterprise CIO, 08 August 2019, 0 comments. Categories: Authentication, Malware, Security.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Why passwords are the weakest defence in a Zero Trust world

  • 90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG.
  • 86% of CIO, CISO and Security VPs would abandon password authentication if they could.
  • Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for replacing passwords.
  • There is a direct correlation between the number of times a user authenticates and the number of user access problems that need to be addressed.

These and many other fascinating insights...

By Louis Columbus, 24 July 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Protecting your organisation from phishing scams: A guide

The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams back in the spotlight, as this was an integral part of the company’s data breach. Unlike many other forms of cyberattack, phishing scams go after your customer or employee data, including credentials like passwords, financial details or sensitive personal information. This data can then be used or sold on for malicious intent, from identity theft or false transactions, to brute force or...

By Elad Schulman, 19 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Cybersecurity enhanced with AI and ML: Improving data loss prevention

The vast and growing amounts of data being created, collected, and used by the enterprise makes the deployment of data security solutions a business imperative. It is essential to implement cybersecurity solutions and practices to prevent data leaks and breaches, but how do businesses stay ahead of the growing sophistication of cyberattacks?

Predictive technologies, such as artificial intelligence (AI) and machine learning...

By Igor Isupov, 15 July 2019, 0 comments. Categories: Applications, Enterprise Mobility, Security.

Why AI cybersecurity is a leap forward in threat intelligence

No sector is immune from cyber attacks and attackers do not discriminate against size of organisation. The objective may be financial or even political, what is certain is that the increasing level of sophistication means that they present some of the most the most strategically significant risks to business today.

Cybersecurity is driven by the need to remain one step ahead of the attacker. As...

By Neil Kell, 11 July 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Data Loss, Security.

Hiscox cyber readiness report notes air of cautious optimism among enterprises

A new report from insurer Hiscox has revealed that while the numbers for cyberattack cost and frequency continue to rise, knowledge and concern is increasing with it.

The report, which analysed 5,400 firms across seven countries, argued cyber threat has “become the unavoidable cost of doing business today.”

Looking at the top figures make for pessimistic reading. The number...

By James Bourne, 09 July 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Security.