Why you need to be able to trust your SD-WAN platform

Imagine a scenario when an IT network manager settles into the task of remotely provisioning and configuring an SD-WAN edge router that’s located in a distant branch office. The router appliance was shipped from a supplier’s warehouse to the branch, unboxed, and plugged into power and Ethernet by a local non-technical employee.

Before this new connection to the corporate WAN can be...

By Anand Oswal, 17 April 2019, 0 comments. Categories: Applications, Case Studies, Data & Analytics, Development, Security.

It’s not me, but it is probably you: How IT still views employees with contempt on cybersecurity

A new report from software as a service (SaaS) operations management and security platform BetterCloud begins with a blunt message. “While cybercriminals, hacktivists and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you.”

According to the study, which featured survey data from 500 IT professionals, the ‘well-meaning but...

By James Bourne, 03 April 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Case study: How the National Crime Agency looks to squash the cybercriminals at source

Ben Russell, head of cyber threat response at the National Crime Agency (NCA), wants to get one thing clear. “We’re not a regulator – we’re not here to dish out fines,” he says. “We’re here to support businesses, investigate the criminals and try and catch people in order to help.”

The agency is not here to judge, or enforce anything in particular, but to help businesses if they...

By James Bourne, 03 April 2019, 0 comments. Categories: Case Studies, Data & Analytics, Employees, Privacy, Security.

Verizon finds organisations increasingly sacrificing security to ‘get the job done’

Have you ever been working on a project and, knowing it was a choice between ensuring security and getting to deadline, been forced to go with the latter? If you have, according to a new report, you have plenty of company.

The latest Verizon Mobile Security Index, published earlier this month, found almost half (48%) of the more than 600 survey respondents had sacrificed the security aspect of their work in order to ‘get...

By James Bourne, 28 March 2019, 0 comments. Categories: Data & Analytics, Employee Education, Employees, Enterprise Mobility, Security.

The importance of building an integrated AI-human cybersecurity strategy

In light of today’s digital transformation causing businesses to operate at machine speeds, organisations need a new way to spot and resolve possible security events. Network operations have become automated, but so have cyber threats. The speed and scale of these threats requires a response that has exceeded analysts’ ability.

That doesn’t mean skilled cybersecurity analysts...

Not if, but when: The value of cybersecurity awareness

For businesses, a cyber-attack is not a matter of “if” but “when”. Every business is at risk of a cyber-attack. In 2018 alone, cyber-attacks on organisations cost the UK economy tens of billions of pounds, with 7 out of 10 companies falling victim to a cyber-attack or breach.

According to the 2017 Data Breach Investigations Report, more than

By Vinaya Sheshadri, 26 March 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

CXOs increasingly suspicious of employees when it comes to data breaches

When a data breach occurs – and unfortunately today it is a question of when rather than if – then looking for the responsible party and safeguarding against future events is a matter of course. Yet according to new data from security provider Egress, the C-suite differs from their employees in terms of who is to blame.

The study, which polled more than 250 CXO executives and 2000 employees across the UK and US,...

By James Bourne, 25 March 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Why SIEM alone is not able to stop insider threats

Hackers come in many forms. They could be a single person acting alone or an organised group of individuals with nefarious intent. With so many possible origin points and numerous varieties of attacks it can be very difficult to prevent them all, let alone figure out where they are coming from and who is perpetrating them.

Owing to how complicated investigating and solving these incidents can be, sometimes it is easier to...

By Pablo Guilamo, 28 February 2019, 0 comments. Categories: Employees, Enterprise Mobility, IoT, Malware, Security.

Why the missing link for enterprise digital transformation is Zero Trust Security

  • Enterprises will invest $2.4tn by 2020 in digital transformation technologies including cloud platforms, cognitive systems, IoT, mobile, robotics, and integration services according to the World Economic Forum
  • Digital transformation software and services revenue in the U.S. is predicted to reach $490bn in 2025, soaring from $190bn in 2019, attaining a Compound Annual Growth Rate (CAGR) of 14.49% according to 

By Louis Columbus, 19 February 2019, 0 comments. Categories: App Platforms, Data & Analytics, Security.

The cybersecurity angle: Why recent research and investment in quantum and IoT is key

Opinion Our Scientific Advisory Team recently compiled a database of nearly 1,200 cybersecurity projects from academic institutions across the globe. Based on this research, various trends were identified. Globally, projects with an IoT element have increased by 123% when comparing the periods January 2008 to June 2013 with July 2013 to December 2018. Around 14% of current projects are IoT-related. With the promise of quantum computing on the horizon, there...

By Tom Ilube, 19 February 2019, 0 comments. Categories: Applications, IoT, Research, Security.

A bird’s eye view of enterprise security: From reaction to prevention

The cybersecurity space has become incredibly convoluted - a simple organic search of “cybersecurity solutions” will generate approximately 28,500,000 results. The nature of cybersecurity makes it a constantly moving target, but the sheer number of tools and methods designed to combat the dizzying array of threats is enough to make any corporate leader’s head spin as they contemplate which technologies achieve what and which are worth the investment.

By Ted Ross, 11 February 2019, 0 comments. Categories: Employee Education, Employees, IoT, Malware, Security.

Dell EMC updated with enhanced data protection for mid-sized businesses

Software developer Dell EMC has updated its Data Domain and Integrated Data Protection Appliance (IDPA) with enhanced data protection services.

With these updates, Dell EMC has made it easier and more efficient for businesses to run its security appliances. For instance, a speed boost has been provided to restores, which is now 2.5 times faster than the previous versions of the appliance. Moreover, recalls for IDPA are now four times faster from the cloud to the hardware, albeit 40,000 IOPS with 20...

By Enterprise CIO, 07 February 2019, 0 comments. Categories: Security.

Why marketing security is the phrase every executive needs to understand in 2019

Headlines around data breaches have become the new norm in today’s digital age. These kinds of headlines are accompanied by new financial consequences for the breached companies in the form of hefty potential fines for non-compliance and class-action lawsuits for failing to adequately protect consumer data.

Enterprise executives around the world watch such news with great interest, but very...

By Marty Greenlow, 24 January 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Key tips for SMEs and encryption: Ease of use and accessibility vital – but don’t skimp on security

Becrypt has been in the disk encryption business for more than 15 years and has carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms.

Based on...

By Bernard Parsons, 22 January 2019, 0 comments. Categories: Data & Analytics, Data Loss, Design, Employees, Security.

Four things every CEO needs to know about ransomware

It’s hard to read the news at the moment without ransomware being mentioned. For example, I typed “ransomware” into Google News recently and got more than one million hits in 0.23 seconds. Even when I limited my search to the past 24 hours it returned more than six pages of links. Therefore, with so many experts writing things that are sufficiently interesting or important to feature as “news” — why has the problem not yet been...

By Dr. Sandra Bell, 21 January 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Malware, Security.

Enterprise mobility advances in 2019: BYOD, cybersecurity, and advanced tech

Enterprises today are growing increasingly dependent on the remote workforce, which brings mutual benefits to employer and employee—but also management challenges, security risks and productivity concerns.

As more businesses adopt and manage mobile technology to keep remote workers connected, telecom and IT managers will see major developments in four key areas of enterprise mobile management—bring your own device...

By Josh Garrett, 18 January 2019, 0 comments. Categories: Applications, BYOD, Enterprise Mobility, Productivity, Security.

Google launches beefier Android Enterprise Recommended program – with nine EMM partners

The bar which has just been set for getting to grips with Android in the enterprise is higher than ever – with the launch of a new Google program.

Android Enterprise Recommended has launched with nine partners which Google says has been able to demonstrate a variety of requirements, from a ‘proven ability to deliver advanced security and management features’, as well as a consistent deployment experience and...

By James Bourne, 17 January 2019, 0 comments. Categories: Android, Applications, Enterprise Mobility, Security.