The evolving role of the CISO: How digitisation brings the fight to security threats

It's a simple fact that data makes the modern economy turn. Being the first business to act on insights gained from pivotal pieces of information gives businesses a distinct competitive advantage. However, it's also quickly becoming a fact that the same data is being targeted by skilled cybercriminals intent on causing damage to infrastructure.   Sophisticated cyber attacks With the world facing sophisticated attacks such as the likes of WannaCry, Petya and NotPetya in 2017, cyber threats are the biggest modern technological fear. Although sectors such as financial services are most at risk, there have also been numerous high-profile attacks on utilities, oil and gas and food manufacturing...

By Robin Whitehead, 07 December 2018, 0 comments. Categories: Security.

How to prevent illness on your network - with the right medicine

The winter season is peak time for infection and disease across the UK.  But the old saying “prevention is better than cure“ is not only relevant to our personal health, but also to our networks and IT systems.

In corporate networks, the classic defence against malware and other external attacks is usually split-up between two solutions: a firewall and a traditional antivirus program. The firewall is similar...

By Ronald Sens, 05 December 2018, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Malware, Security.

Ransomware is the ‘number one’ threat for small and medium businesses, argues Datto

Ransomware continues to be the primary attack vector small businesses face, according to a new report from business continuity and networking provider Datto.

The findings appear in the company’s latest Global State of the Channel Ransomware Report, which polled 2,400 managed service providers. According to the report, more than 55% of those polled said their clients had experienced a ransomware attack in the first six...

By James Bourne, 23 November 2018, 0 comments. Categories: Applications, Malware, Security.

Commoditising cybercrime: The rise of ransomware-as-a-service

Recent years have seen a growing number of high-profile ransomware attacks such as WannaCry hit the headlines for their ability to hijack a huge number of computers in a short space of time and extort victims into paying ransoms in order to get their information back. In the case of WannaCry, over 200,000 computers were infected across 150 countries in just four days, with the ransoms being demanded ranging from $300-$600 per computer. Estimates put the...

By Naaman Hart, 21 November 2018, 0 comments. Categories: Data Loss, Malware, Security.

The real deal on cybercrime, breach timelines, and mounting a proactive defence

Here’s something that may seem obvious but is more true today than ever: Organisations that take security breaches seriously (which should be all of them) can’t afford to sit back and take a reactive approach to their defensive strategy. Although a considerable amount of damage can be done in a shockingly short period of time, simple proactive steps can often thwart cybercriminals and defend organisations against a wide variety of attacks.

By Ted Ross, 19 November 2018, 0 comments. Categories: CIO, Data Loss, Malware, Security.

Get to grips with DevSecOps – and address security flaws much more quickly

The number of vulnerable applications in an organisation’s ecosystem remains at a ‘staggeringly high’ level according to new research – but putting DevSecOps practices into action appear to have some benefits.

That’s according to a report from CA Veracode. The latest State of Software Security report – CA Technologies having acquired Veracode last year – gives a ‘promising’...

By James Bourne, 26 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Productivity, Security.

WhiteHat Security reveals how enterprise security vulnerabilities are introduced via traditional applications

In its 2018 Application Security Statistics Report, titled “The Evolution of the Secure Software Lifecycle”, WhiteHat Security has identified the security vulnerabilities and challenges introduced into the enterprise through traditional applications, and through agile development frameworks, microservices, application programming interfaces (APIs), and cloud architectures.

The annual study, which was published in...

By Enterprise CIO, 22 October 2018, 0 comments. Categories: Employees, Enterprise Mobility, Security.

Three steps to create secure instant messaging within your organisation

Instant messaging (IM) applications are now a given in the modern enterprise. In fact, according to this article in Wired magazine, they are almost as old as the Internet itself!  It’s easy to see why instant messaging applications are popular - they are quick to use, less formal than email and allow for instantaneous communication.  Users can see immediately when their colleagues are online, share files quickly and...

By Jan van Vliet, 19 October 2018, 0 comments. Categories: Collaboration, Enterprise Mobility, Productivity, Security.

Four cybersecurity challenges that critical infrastructures are facing

Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack...

By Anthony Perridge, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Why reports of EMM’s death may be exaggerated

“Put simply, enterprise mobility management (EMM) is dead and focus has shifted towards a unified IoT solution.”

Those were the words of SOTI CEO Carl Rodrigues in an interview with Enterprise Mobility Exchange’s Jason Koestenblatt in which the two discussed mobile transformation, IoT, and what’s next for EMM and MDM.

Rodrigues continued: “EMM will remain a fundamental element of that...

By App47, 16 October 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.

New research shows importance of visibility in mobile device strategy

A lack of visibility into devices and networks is putting businesses at risk of cyberattacks, according to a new report.

The study, put together by Enterprise Mobility Exchange and NetMotion Software and which polled more than 130 respondents at organisations with corporately owned mobile devices, explored employees' relationships with their devices and networks.

Almost half of mobile workers polled said they spent the majority of their working time connected to non-corporate public Wi-Fi and carrier...

By James Bourne, 15 October 2018, 0 comments. Categories: Data Loss, Employees, Enterprise Mobility, Research, Security.

Is there room left for privacy in the digital world?

Just as Native Americans sold the island of Manhattan to colonial governor Peter Minuit for $24 worth glass beads - at least, that’s what the legend says - people are now selling out their private data for “glass beads” to Facebook and Google. For data drilling companies, profit comes first, privacy last. They sacrifice everything for growth and engagement for their platforms in order to collect as much data as possible to profiteer from advertising.

Is there anything we can do about...

By Istvan Lam, 09 October 2018, 0 comments. Categories: Employees, Privacy, Security.

New York cybersecurity fund shows importance of investing in people rather than technology

It seems rather appropriate that the constant surveillance against cyber attack is being championed by the city that never sleeps.

The NYCEDC (New York City Economic Development Corporation) aims to place the city as the leader in security with the Cyber NYC initiative - and up to $100 million in investment. $30m will come from the city, alongside up to an additional $70m from private funding, to put together a series of initiatives. 

Jerusalem Venture Partners (JVP) has been appointed to establish the...

By James Bourne, 08 October 2018, 0 comments. Categories: CIO, Employee Education, Employees, Security.

The current state of enterprise mobile: Seven trends increasing complexity

Just two years ago, enterprise mobile began to replace the dominant siloed approach of deploying mobile one department or business unit at a time, with a new enterprise-wide orientation. As a result, scalable, organisation-wide deployments of mobile are now the norm. Mobile began to be valued as a transformative catalyst for business. Enterprises combined mobile assets with cloud-based applications and business intelligence tools to pull from mobility previously hidden business insights.

With mobility...

By Marco Nielsen, 08 October 2018, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Security.

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed responsibility...

By Ronald Sens, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Mobile, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

The insider threat: Making user errors a thing of the past

It’s a feeling that most of us have experienced at some point: the heart-stopping, head-in-hands moment when you realise that you have copied the wrong person into a sensitive email or attached the wrong file and shared confidential data with unauthorised recipients. Once that data is out there, there is often little you can do except to politely request that the recipient deletes the email and hope that they comply. In today’s world of rigorous data protection legislation, this is simply not...

By Tony Pepper, 25 September 2018, 0 comments. Categories: Employee Education, Employees, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.