Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Why SIEM alone is not able to stop insider threats

Hackers come in many forms. They could be a single person acting alone or an organised group of individuals with nefarious intent. With so many possible origin points and numerous varieties of attacks it can be very difficult to prevent them all, let alone figure out where they are coming from and who is perpetrating them.

Owing to how complicated investigating and solving these incidents can be, sometimes it is easier to...

By Pablo Guilamo, 28 February 2019, 0 comments. Categories: Employees, Enterprise Mobility, IoT, Malware, Security.

Why the missing link for enterprise digital transformation is Zero Trust Security

  • Enterprises will invest $2.4tn by 2020 in digital transformation technologies including cloud platforms, cognitive systems, IoT, mobile, robotics, and integration services according to the World Economic Forum
  • Digital transformation software and services revenue in the U.S. is predicted to reach $490bn in 2025, soaring from $190bn in 2019, attaining a Compound Annual Growth Rate (CAGR) of 14.49% according to 

By Louis Columbus, 19 February 2019, 0 comments. Categories: App Platforms, Data & Analytics, Security.

The cybersecurity angle: Why recent research and investment in quantum and IoT is key

Opinion Our Scientific Advisory Team recently compiled a database of nearly 1,200 cybersecurity projects from academic institutions across the globe. Based on this research, various trends were identified. Globally, projects with an IoT element have increased by 123% when comparing the periods January 2008 to June 2013 with July 2013 to December 2018. Around 14% of current projects are IoT-related. With the promise of quantum computing on the horizon, there...

By Tom Ilube, 19 February 2019, 0 comments. Categories: Applications, IoT, Research, Security.

A bird’s eye view of enterprise security: From reaction to prevention

The cybersecurity space has become incredibly convoluted - a simple organic search of “cybersecurity solutions” will generate approximately 28,500,000 results. The nature of cybersecurity makes it a constantly moving target, but the sheer number of tools and methods designed to combat the dizzying array of threats is enough to make any corporate leader’s head spin as they contemplate which technologies achieve what and which are worth the investment.

By Ted Ross, 11 February 2019, 0 comments. Categories: Employee Education, Employees, IoT, Malware, Security.

Dell EMC updated with enhanced data protection for mid-sized businesses

Software developer Dell EMC has updated its Data Domain and Integrated Data Protection Appliance (IDPA) with enhanced data protection services.

With these updates, Dell EMC has made it easier and more efficient for businesses to run its security appliances. For instance, a speed boost has been provided to restores, which is now 2.5 times faster than the previous versions of the appliance. Moreover, recalls for IDPA are now four times faster from the cloud to the hardware, albeit 40,000 IOPS with 20...

By Enterprise CIO, 07 February 2019, 0 comments. Categories: Security.

Why marketing security is the phrase every executive needs to understand in 2019

Headlines around data breaches have become the new norm in today’s digital age. These kinds of headlines are accompanied by new financial consequences for the breached companies in the form of hefty potential fines for non-compliance and class-action lawsuits for failing to adequately protect consumer data.

Enterprise executives around the world watch such news with great interest, but very...

By Marty Greenlow, 24 January 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Key tips for SMEs and encryption: Ease of use and accessibility vital – but don’t skimp on security

Becrypt has been in the disk encryption business for more than 15 years and has carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms.

Based on...

By Bernard Parsons, 22 January 2019, 0 comments. Categories: Data & Analytics, Data Loss, Design, Employees, Security.

Four things every CEO needs to know about ransomware

It’s hard to read the news at the moment without ransomware being mentioned. For example, I typed “ransomware” into Google News recently and got more than one million hits in 0.23 seconds. Even when I limited my search to the past 24 hours it returned more than six pages of links. Therefore, with so many experts writing things that are sufficiently interesting or important to feature as “news” — why has the problem not yet been...

By Dr. Sandra Bell, 21 January 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Malware, Security.