Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.

Case study: Why ERP solutions for the food industry must do more than ensure compliance

ERP functionality should help solve the challenges that many different types of food businesses face. It must ensure high quality, resource-efficient production and distribution, providing product innovation that has profitability potential while helping a business stay up to date with the latest customer demands. This is how food companies can meet food safety regulations, reduce waste and gain flexibility in terms of the ingredients and raw materials they source.

By Simon Noakes, 11 September 2019, 0 comments. Categories: Case Studies, Enterprise Mobility, Productivity, Security.

Why manufacturing supply chains need Zero Trust security

  • According to the 2019 Verizon Data Breach Investigation Report, manufacturing has been experiencing an increase in financially motivated breaches in the past couple of years, whereby most breaches involve Phishing and the use of stolen credentials.
  • 50% of manufacturers report experiencing a breach over the last 12 months, 11% of which were severe according to Sikich’s 5th Manufacturing and Distribution Survey, 2019.
  • Manufacturing’s most commonly data compromised includes credentials (49%),...

By Louis Columbus, 06 September 2019, 0 comments. Categories: Data & Analytics, Data Loss, Security.

The top 10 most popular cybersecurity certifications in 2019: A guide

  • IT decision-makers (ITDMs) report that cybersecurity is the hardest area to find qualified talent, followed by cloud computing skills
  • 56% of ITDMs report that certified personnel closes organisational skills gaps.
  • 48% of ITDMs report that certifications boost productivity
  • 44% of ITDM report that certifications help meet client requirements

Knowing which cybersecurity certifications are in the greatest demand is invaluable in planning a career in the field. I asked Global Knowledge, the...

By Louis Columbus, 05 September 2019, 0 comments. Categories: Employee Education, Employees, Security.

One in five CISOs reports directly to the CEO today as organisations focus more on IoT and cloud

The latest study from Wipro has found that one in five CISOs are now reporting directly to the CEO, with cloud and Internet of Things (IoT) strategies increasingly on the radar.

Wipro’s latest study, titled “2019 State of Cybersecurity Report”, is based on three months of primary and secondary research, including surveys of security leadership, operational analysts, and 211 global organisations across 27...

By Enterprise CIO, 04 September 2019, 0 comments. Categories: CIO, Research, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC) professionals across enterprise...

By James Bourne, 02 September 2019, 0 comments. Categories: CIO, Collaboration, Data Loss, Employee Education, Employees, Research, Security.

Appdome launches Zero Management Mobility for revamped enterprise security focus

No-code mobile integration vendor Appdome has launched Zero Management Mobility – a service which aims to move further towards a touchless cybersecurity future.

The solution secures enterprise mobile apps in bring your own device (BYOD) environments without the use of management profiles on employee devices. The offering ‘provides customers unique combinations of Appdome security’, from encryption to obfuscation,...

By James Bourne, 27 August 2019, 0 comments. Categories: BYOD, Development, Enterprise Mobility, Security.