Get communication right between the CISO and the board to improve enterprise security

If security is a hot button issue in your organisation – and of course, why wouldn’t it be? – then CISOs and the rest of the board need to more ably see eye to eye, according to a new report.

The report, from Kudelski Security’s Client Advisory Council (CAC), argues it is a two-way street. The board needs to see CISOs as equal partners in the C-suite, rather than ‘compliance chasers and one-way cost centres’, while CISOs need to see cybersecurity from a board point of view...

By James Bourne, 11 July 2018, 0 comments. Categories: CIO, Enterprise Mobility, Security.

Phishing awareness training not translating to fewer clicks, research argues

The emails just keep on coming; many relevant, but many more either just good old fashioned spam or, worse, phishing attempts. Yet new research argues that despite regular phishing awareness training, many companies are still falling for the old routines.

The research was conducted by Ironscales, an Israel-based company which claims to offer the world’s first automated phishing prevention, detection, and response platform. More on that later – but according to the data, which came from 300...

By James Bourne, 10 July 2018, 0 comments. Categories: Employee Education, Employees, Security.

Don't compromise security when exploring blockchain initiatives, organisations warned

If you mention the word blockchain at an event or networking soiree, there will naturally be a frenzy of activity; how is your business going to be transformed by it? How much are you betting on it? But is this rush to take advantage of the newest, shiniest object neglecting security?

According to new figures from RSA, traditional security information and event management (SIEM) tools aren't going to cut it with identifying 'new normal' behaviours associated with...

By James Bourne, 05 July 2018, 0 comments. Categories: CIO, Employees, Security.

How analytics are empowering next-gen access and zero trust security

Employee identities are the new security perimeter of any business.

80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe. And with Gartner predicting worldwide security...

By Louis Columbus, 03 July 2018, 0 comments. Categories: Employee Education, Employees, Security.

BlackBerry and Samsung continue collaboration to help businesses with digital transformation

BlackBerry and Samsung are rekindling their long-standing partnership and are setting out a ‘multi-year strategic relationship’ to help businesses accelerate digital transformation and ‘Enterprise of Things’ initiatives.

The key facet of the move will see joint enterprise customers being able to manage their wide collection of Samsung devices – be they phones, tablets, or wearables – out of the box through BlackBerry’s UEM (universal endpoint management) platform...

By James Bourne, 02 July 2018, 0 comments. Categories: BlackBerry, Employees, Enterprise Mobility, IoT, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

New research sounds warning over balancing employee productivity and security

There always needs to be a fine line between ensuring productivity within employees and keeping them happy. Take the story earlier this month regarding an employee in Japan who was publicly admonished for ‘habitually’ leaving his desk a few minutes early for lunch.

Yet new figures from Spiceworks have found that employees spend up to 26 days per year on websites unrelated to their job.

According...

By James Bourne, 25 June 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

How to counter the increasing volume of DDoS attacks

As attacks are getting more sophisticated, so must our defences.

The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.

Such a service meant that criminals could flood servers with traffic for as little as...

By Ronald Sens, 25 June 2018, 0 comments. Categories: CIO, Data Loss, Employees, Enterprise Mobility, Security.

Automation, orchestration and response: Evolution of incident management

The cybersecurity world is constantly growing. It never stands still, there is always some kind of threat, hack or vulnerability happening, making it nigh on impossible to keep track. Cybersecurity is like a high-stakes game where the bad guys get endless ‘lives’ during an attack and yet a single mistake from the good guys can cause a breach.

Nowadays, everybody uses SIEM (Security Information and Event Management) technology to consolidate alerts from their detection products into a single list...

By Vinaya Sheshadri, 20 June 2018, 0 comments. Categories: Identity, Security.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.