Dealing with insider threats and keeping your enterprise secure: A guide

There are many threats to enterprise cyber security with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly agree that their employees do not care about its security practices. With companies aware of the issue, what...

By Ronald Sens, 21 May 2018, 0 comments. Categories: Employee Education, Employees, Security.

How zero trust security is fuelling new business growth

Bottom line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses.

The era of Zero Trust Security is here, accelerated by NGA solutions and driven by the needs of digital businesses for security strategies that can keep up with the rapidly expanding...

By Louis Columbus, 15 May 2018, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

What the consolidation of phishing awareness training means for CIOs

Last November I was asked for my 2018 cybersecurity predictions, and I was most confident about one. That projection: the phishing awareness training market was primed for consolidation.

Fast-forward just a few months and my inner genie certainly appears to be out of the bottle. By January 3, Barracuda Networks had announced its acquisition of Phishline, a social engineering training platform, for an undisclosed amount. Shortly thereafter, Proofpoint...

By Eyal Benishti, 26 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Security.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan Van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

MobileIron expands partnership with Lenovo to include new offering

Enterprise mobility management (EMM) software provider MobileIron has announced an expansion of its partnership with Lenovo, aiming to create a unified hardware and software experience for organisations.

Last year’s Mobile World Congress saw the first announcement of the partnership, whereby Lenovo customers could purchase MobileIron’s security and management platform alongside...

By James Bourne, 16 April 2018, 0 comments. Categories: Enterprise Mobility, Productivity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

How gamification and automation can change your organisation’s cybersecurity stance

Gamification could be the key tool to instil a better cybersecurity posture in your organisation – with gamers potentially representing the next generation of threat hunters.

That is the primary finding from a new report by McAfee which polled 950 cybersecurity managers at organisations with 500 or more employees. The study, titled ‘Winning the Game’, argues popular security competition games, such as capture the flag, make sense from an inter-organisational perspective. Four in 10 companies...

By James Bourne, 09 April 2018, 0 comments. Categories: Employees, Gamification, Security.

Qualys acquires 1Mobility for enterprise mobility management boost

California-based cloud-based security firm Qualys has acquired the software assets of Singapore-based 1Mobility, allowing it to fully integrate the latter’s solutions in its cloud platform and mobile applications.

The move allows Qualys to help enterprises develop and continuously update an inventory on all available mobile operating systems.

The integration will also allow enterprises to continuously assess their security and compliance posture, while quarantining devices that are compromised or...

By Enterprise CIO, 06 April 2018, 0 comments. Categories: BYOD, Cloud , Enterprise Mobility, Security.

Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

VMware boosts Workspace ONE features with greater security and automation

VMware has added new features around its Workspace ONE platform to include data-driven intelligence and predictive security.

The new features include Workspace ONE Intelligence, a cloud-based service which integrates with the main platform to aggregate users, apps, networks and endpoint data, as well as the Workspace ONE Trust Network, which combines the security of the primary platform with best practices from featured partners. The seven companies combining with VMware on this are Carbon Black, CrowdStrike,...

By James Bourne, 23 March 2018, 0 comments. Categories: App Platforms, Data & Analytics, Enterprise Mobility, Security.

Why C-suite expertise does not always translate to InfoSec awareness

Their experience and judgement has led C-suite executives to the head of their organisations – yet according to new research from Bitdefender, these employees are most likely to expose the company to a major cyberattack.

According to the study, which polled 250 CIOs, CISOs and CSOs, more than two in five (41%) perceive their C-suite colleagues as InfoSec averse. A similar number (42%) say they are most concerned with a loss of customer and stakeholder trust with data breaches, while more than a quarter...

By James Bourne, 20 March 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employees, Security.

Why enterprises are losing by default to cybercriminals

In sport, if one team does not have enough players to field a team they lose by default. This is the easiest way to win for the victorious party. Not a drop of sweat was produced and there was no risk of injury or embarrassment. The only thing the victors had to do was show up and they get to take home the trophy.

On the other side, this is also the most disappointing loss for the losing party. No matter what their reason is for not showing up, they still...

By Alastair Hartrup, 13 March 2018, 0 comments. Categories: CIO, Security.

Why cryptocurrency is the newest DDoS battlefield

It is hard to pretend that cryptocurrency is still a niche fad. In January, James Altucher, entrepreneur and editor of the Altucher report, predicted to CNBC that cryptocurrencies will replace some or all paper money in the long run. He believes enterprises will eventually adopt the Bitcoin as the cryptocurrency begins to rise to prominence. And it’s not just finance and tech getting in on the cryptocurrency boom. Celebrities such as 50 Cent revealed recently that he had $7 million in Bitcoin that he...

By Ronald Sens, 05 March 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

A guide: How to better manage your personal information

Today, information is being collected at a rapid pace. If you don't take the right steps to protect your information, you could suffer from a breach that would endanger your private banking and other personal information. Therefore, you need to manage it with the right tools and strategies. But this can seem overwhelming at first.

Luckily, it doesn't have to be. If you use the advice below you can have peace of mind and be efficient while using your information in the best way possible.

IT

The first...

By Rick Delgado, 20 February 2018, 0 comments. Categories: Big Data, CIO, Employees, Security.

Gartner identifies seven steps to bring down risk of security threats from Spectre and Meltdown

It is beneficial for leaders in the security and risk management field to adopt a pragmatic and risk-based approach to deal with the ongoing security threats posed by the "Spectre" and "Meltdown” vulnerabilities, according to Gartner.

Gartner identifies seven steps that security and risk heads can follow to bring down the risks associated with security threats.

Almost all modern IT systems are at risk of security threats so all desktops, mobiles, servers, virtual machines, IoT devices and...

By Enterprise CIO, 16 February 2018, 0 comments. Categories: CIO, Privacy, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

MobileIron and Google Cloud partner on enterprise cloud services for operators

Enterprise mobility management (EMM) provider MobileIron and Google Cloud have announced they are to collaborate on a new end-to-end platform for enterprise cloud services.

The two companies will combine Orbitera, a cloud commerce platform which Google Cloud acquired in 2016, with MobileIron’s app distribution, security, and analytics. The proposed result will be aimed at operators and enterprises, with potential features including customised bundles and customised branding.

As MobileIron sees it, the...

By James Bourne, 30 January 2018, 0 comments. Categories: Enterprise Mobility, Marketing, Security.

Latest Okta report showcases increased enterprise need for security apps and tools

The latest Businesses @ Work report from identity management provider Okta has revealed many of the fastest growing apps in the enterprise are based around security – and suggests that GDPR may be behind the renewed push.

Of the 15 fastest growing apps in the Okta network last year, seven were based around security. These were, in order of popularity, Jamf, KnowBe4, Cisco Umbrella, DigiCert, Sophos, Mimecast and CloudFlare.

Writing in an official company blog, Okta CEO Todd McKinnon argues that the...

By James Bourne, 24 January 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.