For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.

Dealing with insider threats and keeping your enterprise secure: A guide

There are many threats to enterprise cyber security with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly agree that their employees do not care about its security practices. With companies aware of the issue, what...

By Ronald Sens, 21 May 2018, 0 comments. Categories: Employee Education, Employees, Security.

How zero trust security is fuelling new business growth

Bottom line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses.

The era of Zero Trust Security is here, accelerated by NGA solutions and driven by the needs of digital businesses for security strategies that can keep up with the rapidly expanding...

By Louis Columbus, 15 May 2018, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

What the consolidation of phishing awareness training means for CIOs

Last November I was asked for my 2018 cybersecurity predictions, and I was most confident about one. That projection: the phishing awareness training market was primed for consolidation.

Fast-forward just a few months and my inner genie certainly appears to be out of the bottle. By January 3, Barracuda Networks had announced its acquisition of Phishline, a social engineering training platform, for an undisclosed amount. Shortly thereafter, Proofpoint...

By Eyal Benishti, 26 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Security.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

MobileIron expands partnership with Lenovo to include new offering

Enterprise mobility management (EMM) software provider MobileIron has announced an expansion of its partnership with Lenovo, aiming to create a unified hardware and software experience for organisations.

Last year’s Mobile World Congress saw the first announcement of the partnership, whereby Lenovo customers could purchase MobileIron’s security and management platform alongside...

By James Bourne, 16 April 2018, 0 comments. Categories: Enterprise Mobility, Productivity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.