BlackBerry and Samsung continue collaboration to help businesses with digital transformation

BlackBerry and Samsung are rekindling their long-standing partnership and are setting out a ‘multi-year strategic relationship’ to help businesses accelerate digital transformation and ‘Enterprise of Things’ initiatives.

The key facet of the move will see joint enterprise customers being able to manage their wide collection of Samsung devices – be they phones, tablets, or wearables – out of the box through BlackBerry’s UEM (universal endpoint management) platform...

By James Bourne, 02 July 2018, 0 comments. Categories: BlackBerry, Employees, Enterprise Mobility, IoT, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

New research sounds warning over balancing employee productivity and security

There always needs to be a fine line between ensuring productivity within employees and keeping them happy. Take the story earlier this month regarding an employee in Japan who was publicly admonished for ‘habitually’ leaving his desk a few minutes early for lunch.

Yet new figures from Spiceworks have found that employees spend up to 26 days per year on websites unrelated to their job.

According...

By James Bourne, 25 June 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

How to counter the increasing volume of DDoS attacks

As attacks are getting more sophisticated, so must our defences.

The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.

Such a service meant that criminals could flood servers with traffic for as little as...

By Ronald Sens, 25 June 2018, 0 comments. Categories: CIO, Data Loss, Employees, Enterprise Mobility, Security.

Automation, orchestration and response: Evolution of incident management

The cybersecurity world is constantly growing. It never stands still, there is always some kind of threat, hack or vulnerability happening, making it nigh on impossible to keep track. Cybersecurity is like a high-stakes game where the bad guys get endless ‘lives’ during an attack and yet a single mistake from the good guys can cause a breach.

Nowadays, everybody uses SIEM (Security Information and Event Management) technology to consolidate alerts from their detection products into a single list...

By Vinaya Sheshadri, 20 June 2018, 0 comments. Categories: Identity, Security.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

Enterprise mobility and security: How to build a BYOD policy

As far back as 2012, Microsoft figures found that more than two thirds (67%) of workers already use their personal devices for work purposes – and that 87% of companies rely on their employee using personal devices to access business apps.

This, of course, is BYOD (bring your own device), and it’s more popular than ever before. Today’s mobile workforce benefits from easier collaboration, better tools and increased popularity – which is why remote teams and enterprise mobility are so...

By Tim Isaac, 01 June 2018, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

The real state of DevSecOps: Checking on automation, speed, and accuracy

Synopsys commissioned 451 Research to conduct a study on the state of DevSecOps. As described in the report “DevSecOps Realities and Opportunities,” it was found that only half of DevOps teams include application security testing (AST) in their continuous integretion and continuous deploypment (CI/CD) workflows. DevOps teams face both challenges and opportunities as they apply application security tools and...

By Meera Rao, 24 May 2018, 0 comments. Categories: CIO, Development, Security.

For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.