Don't compromise security when exploring blockchain initiatives, organisations warned

If you mention the word blockchain at an event or networking soiree, there will naturally be a frenzy of activity; how is your business going to be transformed by it? How much are you betting on it? But is this rush to take advantage of the newest, shiniest object neglecting security?

According to new figures from RSA, traditional security information and event management (SIEM) tools aren't going to cut it with identifying 'new normal' behaviours associated with...

By James Bourne, 05 July 2018, 0 comments. Categories: CIO, Employees, Security.

How analytics are empowering next-gen access and zero trust security

Employee identities are the new security perimeter of any business.

80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe. And with Gartner predicting worldwide security...

By Louis Columbus, 03 July 2018, 0 comments. Categories: Employee Education, Employees, Security.

BlackBerry and Samsung continue collaboration to help businesses with digital transformation

BlackBerry and Samsung are rekindling their long-standing partnership and are setting out a ‘multi-year strategic relationship’ to help businesses accelerate digital transformation and ‘Enterprise of Things’ initiatives.

The key facet of the move will see joint enterprise customers being able to manage their wide collection of Samsung devices – be they phones, tablets, or wearables – out of the box through BlackBerry’s UEM (universal endpoint management) platform...

By James Bourne, 02 July 2018, 0 comments. Categories: BlackBerry, Employees, Enterprise Mobility, IoT, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

New research sounds warning over balancing employee productivity and security

There always needs to be a fine line between ensuring productivity within employees and keeping them happy. Take the story earlier this month regarding an employee in Japan who was publicly admonished for ‘habitually’ leaving his desk a few minutes early for lunch.

Yet new figures from Spiceworks have found that employees spend up to 26 days per year on websites unrelated to their job.

According...

By James Bourne, 25 June 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

How to counter the increasing volume of DDoS attacks

As attacks are getting more sophisticated, so must our defences.

The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.

Such a service meant that criminals could flood servers with traffic for as little as...

By Ronald Sens, 25 June 2018, 0 comments. Categories: CIO, Data Loss, Employees, Enterprise Mobility, Security.

Automation, orchestration and response: Evolution of incident management

The cybersecurity world is constantly growing. It never stands still, there is always some kind of threat, hack or vulnerability happening, making it nigh on impossible to keep track. Cybersecurity is like a high-stakes game where the bad guys get endless ‘lives’ during an attack and yet a single mistake from the good guys can cause a breach.

Nowadays, everybody uses SIEM (Security Information and Event Management) technology to consolidate alerts from their detection products into a single list...

By Vinaya Sheshadri, 20 June 2018, 0 comments. Categories: Identity, Security.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

Enterprise mobility and security: How to build a BYOD policy

As far back as 2012, Microsoft figures found that more than two thirds (67%) of workers already use their personal devices for work purposes – and that 87% of companies rely on their employee using personal devices to access business apps.

This, of course, is BYOD (bring your own device), and it’s more popular than ever before. Today’s mobile workforce benefits from easier collaboration, better tools and increased popularity – which is why remote teams and enterprise mobility are so...

By Tim Isaac, 01 June 2018, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

The real state of DevSecOps: Checking on automation, speed, and accuracy

Synopsys commissioned 451 Research to conduct a study on the state of DevSecOps. As described in the report “DevSecOps Realities and Opportunities,” it was found that only half of DevOps teams include application security testing (AST) in their continuous integretion and continuous deploypment (CI/CD) workflows. DevOps teams face both challenges and opportunities as they apply application security tools and...

By Meera Rao, 24 May 2018, 0 comments. Categories: CIO, Development, Security.