The importance of building an integrated AI-human cybersecurity strategy

In light of today’s digital transformation causing businesses to operate at machine speeds, organisations need a new way to spot and resolve possible security events. Network operations have become automated, but so have cyber threats. The speed and scale of these threats requires a response that has exceeded analysts’ ability.

That doesn’t mean skilled cybersecurity analysts...

Not if, but when: The value of cybersecurity awareness

For businesses, a cyber-attack is not a matter of “if” but “when”. Every business is at risk of a cyber-attack. In 2018 alone, cyber-attacks on organisations cost the UK economy tens of billions of pounds, with 7 out of 10 companies falling victim to a cyber-attack or breach.

According to the 2017 Data Breach Investigations Report, more than

By Vinaya Sheshadri, 26 March 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

CXOs increasingly suspicious of employees when it comes to data breaches

When a data breach occurs – and unfortunately today it is a question of when rather than if – then looking for the responsible party and safeguarding against future events is a matter of course. Yet according to new data from security provider Egress, the C-suite differs from their employees in terms of who is to blame.

The study, which polled more than 250 CXO executives and 2000 employees across the UK and US,...

By James Bourne, 25 March 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Why SIEM alone is not able to stop insider threats

Hackers come in many forms. They could be a single person acting alone or an organised group of individuals with nefarious intent. With so many possible origin points and numerous varieties of attacks it can be very difficult to prevent them all, let alone figure out where they are coming from and who is perpetrating them.

Owing to how complicated investigating and solving these incidents can be, sometimes it is easier to...

By Pablo Guilamo, 28 February 2019, 0 comments. Categories: Employees, Enterprise Mobility, IoT, Malware, Security.

Why the missing link for enterprise digital transformation is Zero Trust Security

  • Enterprises will invest $2.4tn by 2020 in digital transformation technologies including cloud platforms, cognitive systems, IoT, mobile, robotics, and integration services according to the World Economic Forum
  • Digital transformation software and services revenue in the U.S. is predicted to reach $490bn in 2025, soaring from $190bn in 2019, attaining a Compound Annual Growth Rate (CAGR) of 14.49% according to 

By Louis Columbus, 19 February 2019, 0 comments. Categories: App Platforms, Data & Analytics, Security.

The cybersecurity angle: Why recent research and investment in quantum and IoT is key

Opinion Our Scientific Advisory Team recently compiled a database of nearly 1,200 cybersecurity projects from academic institutions across the globe. Based on this research, various trends were identified. Globally, projects with an IoT element have increased by 123% when comparing the periods January 2008 to June 2013 with July 2013 to December 2018. Around 14% of current projects are IoT-related. With the promise of quantum computing on the horizon, there...

By Tom Ilube, 19 February 2019, 0 comments. Categories: Applications, IoT, Research, Security.

A bird’s eye view of enterprise security: From reaction to prevention

The cybersecurity space has become incredibly convoluted - a simple organic search of “cybersecurity solutions” will generate approximately 28,500,000 results. The nature of cybersecurity makes it a constantly moving target, but the sheer number of tools and methods designed to combat the dizzying array of threats is enough to make any corporate leader’s head spin as they contemplate which technologies achieve what and which are worth the investment.

By Ted Ross, 11 February 2019, 0 comments. Categories: Employee Education, Employees, IoT, Malware, Security.