Why the missing link for enterprise digital transformation is Zero Trust Security

  • Enterprises will invest $2.4tn by 2020 in digital transformation technologies including cloud platforms, cognitive systems, IoT, mobile, robotics, and integration services according to the World Economic Forum
  • Digital transformation software and services revenue in the U.S. is predicted to reach $490bn in 2025, soaring from $190bn in 2019, attaining a Compound Annual Growth Rate (CAGR) of 14.49% according to 

By Louis Columbus, 19 February 2019, 0 comments. Categories: App Platforms, Data & Analytics, Security.

The cybersecurity angle: Why recent research and investment in quantum and IoT is key

Opinion Our Scientific Advisory Team recently compiled a database of nearly 1,200 cybersecurity projects from academic institutions across the globe. Based on this research, various trends were identified. Globally, projects with an IoT element have increased by 123% when comparing the periods January 2008 to June 2013 with July 2013 to December 2018. Around 14% of current projects are IoT-related. With the promise of quantum computing on the horizon, there...

By Tom Ilube, 19 February 2019, 0 comments. Categories: Applications, IoT, Research, Security.

A bird’s eye view of enterprise security: From reaction to prevention

The cybersecurity space has become incredibly convoluted - a simple organic search of “cybersecurity solutions” will generate approximately 28,500,000 results. The nature of cybersecurity makes it a constantly moving target, but the sheer number of tools and methods designed to combat the dizzying array of threats is enough to make any corporate leader’s head spin as they contemplate which technologies achieve what and which are worth the investment.

By Ted Ross, 11 February 2019, 0 comments. Categories: Employee Education, Employees, IoT, Malware, Security.

Dell EMC updated with enhanced data protection for mid-sized businesses

Software developer Dell EMC has updated its Data Domain and Integrated Data Protection Appliance (IDPA) with enhanced data protection services.

With these updates, Dell EMC has made it easier and more efficient for businesses to run its security appliances. For instance, a speed boost has been provided to restores, which is now 2.5 times faster than the previous versions of the appliance. Moreover, recalls for IDPA are now four times faster from the cloud to the hardware, albeit 40,000 IOPS with 20...

By Enterprise CIO, 07 February 2019, 0 comments. Categories: Security.

Why marketing security is the phrase every executive needs to understand in 2019

Headlines around data breaches have become the new norm in today’s digital age. These kinds of headlines are accompanied by new financial consequences for the breached companies in the form of hefty potential fines for non-compliance and class-action lawsuits for failing to adequately protect consumer data.

Enterprise executives around the world watch such news with great interest, but very...

By Marty Greenlow, 24 January 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Key tips for SMEs and encryption: Ease of use and accessibility vital – but don’t skimp on security

Becrypt has been in the disk encryption business for more than 15 years and has carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms.

Based on...

By Bernard Parsons, 22 January 2019, 0 comments. Categories: Data & Analytics, Data Loss, Design, Employees, Security.

Four things every CEO needs to know about ransomware

It’s hard to read the news at the moment without ransomware being mentioned. For example, I typed “ransomware” into Google News recently and got more than one million hits in 0.23 seconds. Even when I limited my search to the past 24 hours it returned more than six pages of links. Therefore, with so many experts writing things that are sufficiently interesting or important to feature as “news” — why has the problem not yet been...

By Dr. Sandra Bell, 21 January 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Malware, Security.

Enterprise mobility advances in 2019: BYOD, cybersecurity, and advanced tech

Enterprises today are growing increasingly dependent on the remote workforce, which brings mutual benefits to employer and employee—but also management challenges, security risks and productivity concerns.

As more businesses adopt and manage mobile technology to keep remote workers connected, telecom and IT managers will see major developments in four key areas of enterprise mobile management—bring your own device...

By Josh Garrett, 18 January 2019, 0 comments. Categories: Applications, BYOD, Enterprise Mobility, Productivity, Security.

Google launches beefier Android Enterprise Recommended program – with nine EMM partners

The bar which has just been set for getting to grips with Android in the enterprise is higher than ever – with the launch of a new Google program.

Android Enterprise Recommended has launched with nine partners which Google says has been able to demonstrate a variety of requirements, from a ‘proven ability to deliver advanced security and management features’, as well as a consistent deployment experience and...

By James Bourne, 17 January 2019, 0 comments. Categories: Android, Applications, Enterprise Mobility, Security.

Yubico introduces NFC-enabled security key and connector

Hardware authentication device manufacturer Yubico has introduced two new device form factors, namely the Security Key NFC and the YubiKey Lightening connector for iPhones and iPads, at the ongoing CES 2019 event in Las Vegas, Nevada.

Manufactured in the US and Sweden, the Security Key NFC is made from reinforced fiberglass that is hermetically sealed and injection moulded into a monolithic block, which delivers remarkable...

By Enterprise CIO, 15 January 2019, 0 comments. Categories: App Platforms, Security.

Most cybersecurity research focusing on CPS, IoT and cryptography – but where is AI?

As cybersecurity continues to be a vital area for practically every organisation, the good news is that research continues to be strong in the field.

That’s the latest finding from Crossword Cybersecurity. The company looked at almost 1,200 current and past projects from academic institutions across four continents and found several trends which had emerged since 2013.

There were...

By James Bourne, 10 January 2019, 0 comments. Categories: Data & Analytics, Research, Security.

New guidelines aim to help healthcare CIOs with cybersecurity initiatives

CIOs in healthcare will without exception have cybersecurity as one of their primary focus areas for 2019 – if not their biggest priority. To help in this quest, the Department of Health and Human Services (HHS) has published a checklist of security best practices to help ensure a ‘holistic view of the intersection between cybersecurity and healthcare’, in the organisation’s own words.

The

By James Bourne, 07 January 2019, 0 comments. Categories: CIO, Data Loss, Security.

Microsoft beefs up 365 security and compliance with more advanced offerings

Microsoft is certainly not letting up just because it is the start of the year. The company is launching two new offerings for its enterprise-focused Microsoft 365 suite around increasing security and compliance.

The solutions, around identity and threat protection and information protection and compliance respectively, aim to tie up a few more of the disparate areas within the Microsoft enterprise portfolio. Identity and...

By James Bourne, 03 January 2019, 0 comments. Categories: Enterprise Mobility, Microsoft, Security.

Technology lessons learned for the CIO in 2018 – and what to expect in 2019

As CIOs look to get their organisations on board with disruptive technologies such as artificial intelligence (AI) and the Robotic Process Automation (RPA), it’s important to ensure that they take the right journey. After all, the path to digital transformation isn’t the same for everyone.

CIOs need to ask themselves how AI will exactly help deliver their business goals, or indeed how RPA will integrate into their infrastructure. And what about the cloud, which will no doubt become integral to AI...

By Gordon Wilson, 20 December 2018, 0 comments. Categories: CIO, Security.

The evolving role of the CISO: How digitisation brings the fight to security threats

It's a simple fact that data makes the modern economy turn. Being the first business to act on insights gained from pivotal pieces of information gives businesses a distinct competitive advantage. However, it's also quickly becoming a fact that the same data is being targeted by skilled cybercriminals intent on causing damage to infrastructure.   Sophisticated cyber attacks With the world facing sophisticated attacks such as the likes of WannaCry, Petya and NotPetya in 2017, cyber threats are the biggest modern technological fear. Although sectors such as financial services are most at risk, there have also been numerous high-profile attacks on utilities, oil and gas and food manufacturing...

By Robin Whitehead, 07 December 2018, 0 comments. Categories: Security.

How to prevent illness on your network - with the right medicine

The winter season is peak time for infection and disease across the UK.  But the old saying “prevention is better than cure“ is not only relevant to our personal health, but also to our networks and IT systems.

In corporate networks, the classic defence against malware and other external attacks is usually split-up between two solutions: a firewall and a traditional antivirus program. The firewall is similar...

By Ronald Sens, 05 December 2018, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Malware, Security.

Ransomware is the ‘number one’ threat for small and medium businesses, argues Datto

Ransomware continues to be the primary attack vector small businesses face, according to a new report from business continuity and networking provider Datto.

The findings appear in the company’s latest Global State of the Channel Ransomware Report, which polled 2,400 managed service providers. According to the report, more than 55% of those polled said their clients had experienced a ransomware attack in the first six...

By James Bourne, 23 November 2018, 0 comments. Categories: Applications, Malware, Security.

Commoditising cybercrime: The rise of ransomware-as-a-service

Recent years have seen a growing number of high-profile ransomware attacks such as WannaCry hit the headlines for their ability to hijack a huge number of computers in a short space of time and extort victims into paying ransoms in order to get their information back. In the case of WannaCry, over 200,000 computers were infected across 150 countries in just four days, with the ransoms being demanded ranging from $300-$600 per computer. Estimates put the...

By Naaman Hart, 21 November 2018, 0 comments. Categories: Data Loss, Malware, Security.

The real deal on cybercrime, breach timelines, and mounting a proactive defence

Here’s something that may seem obvious but is more true today than ever: Organisations that take security breaches seriously (which should be all of them) can’t afford to sit back and take a reactive approach to their defensive strategy. Although a considerable amount of damage can be done in a shockingly short period of time, simple proactive steps can often thwart cybercriminals and defend organisations against a wide variety of attacks.

By Ted Ross, 19 November 2018, 0 comments. Categories: CIO, Data Loss, Malware, Security.