10 ways AI and machine learning are improving endpoint security

  • Gartner predicts $137.4 billion will be spent on information security and risk management in 2019, increasing to $175.5bn in 2023, reaching a CAGR of 9.1%. Cloud security, data security, and infrastructure protection are the fastest-growing areas of security spending through 2023.
  • 69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks with the majority of telecom companies (80%) saying they are counting on AI to help identify...

By Louis Columbus, 07 October 2019, 0 comments. Categories: Applications, App Platforms, Authentication, Security.

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.

Case study: Why ERP solutions for the food industry must do more than ensure compliance

ERP functionality should help solve the challenges that many different types of food businesses face. It must ensure high quality, resource-efficient production and distribution, providing product innovation that has profitability potential while helping a business stay up to date with the latest customer demands. This is how food companies can meet food safety regulations, reduce waste and gain flexibility in terms of the ingredients and raw materials they source.

By Simon Noakes, 11 September 2019, 0 comments. Categories: Case Studies, Enterprise Mobility, Productivity, Security.

Why manufacturing supply chains need Zero Trust security

  • According to the 2019 Verizon Data Breach Investigation Report, manufacturing has been experiencing an increase in financially motivated breaches in the past couple of years, whereby most breaches involve Phishing and the use of stolen credentials.
  • 50% of manufacturers report experiencing a breach over the last 12 months, 11% of which were severe according to Sikich’s 5th Manufacturing and Distribution Survey, 2019.
  • Manufacturing’s most commonly data compromised includes credentials (49%),...

By Louis Columbus, 06 September 2019, 0 comments. Categories: Data & Analytics, Data Loss, Security.

The top 10 most popular cybersecurity certifications in 2019: A guide

  • IT decision-makers (ITDMs) report that cybersecurity is the hardest area to find qualified talent, followed by cloud computing skills
  • 56% of ITDMs report that certified personnel closes organisational skills gaps.
  • 48% of ITDMs report that certifications boost productivity
  • 44% of ITDM report that certifications help meet client requirements

Knowing which cybersecurity certifications are in the greatest demand is invaluable in planning a career in the field. I asked Global Knowledge, the...

By Louis Columbus, 05 September 2019, 0 comments. Categories: Employee Education, Employees, Security.

One in five CISOs reports directly to the CEO today as organisations focus more on IoT and cloud

The latest study from Wipro has found that one in five CISOs are now reporting directly to the CEO, with cloud and Internet of Things (IoT) strategies increasingly on the radar.

Wipro’s latest study, titled “2019 State of Cybersecurity Report”, is based on three months of primary and secondary research, including surveys of security leadership, operational analysts, and 211 global organisations across 27...

By Enterprise CIO, 04 September 2019, 0 comments. Categories: CIO, Research, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC) professionals across enterprise...

By James Bourne, 02 September 2019, 0 comments. Categories: CIO, Collaboration, Data Loss, Employee Education, Employees, Research, Security.

Appdome launches Zero Management Mobility for revamped enterprise security focus

No-code mobile integration vendor Appdome has launched Zero Management Mobility – a service which aims to move further towards a touchless cybersecurity future.

The solution secures enterprise mobile apps in bring your own device (BYOD) environments without the use of management profiles on employee devices. The offering ‘provides customers unique combinations of Appdome security’, from encryption to obfuscation,...

By James Bourne, 27 August 2019, 0 comments. Categories: BYOD, Development, Enterprise Mobility, Security.

Tackling cybercrime one step at a time: How businesses can stay connected and protected

As concern around cyber security continues to rapidly grow and threats become increasingly complex, the challenges faced by businesses are mounting considerably. In fact, when assessing the cyber security risk, it is no longer a question of if a business will be attacked, but when.

Today, significant cyber security breaches are becoming commonplace in newspaper headlines, with British Airways among one of the latest organisations to face the consequences of a data breach. This resulted in around 500,000...

By Shani Latif, 22 August 2019, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

How AI is predicting the future of online fraud detection

Bottom line: Combining supervised and unsupervised machine learning as part of a broader artificial intelligence (AI) fraud detection strategy enables digital businesses to quickly and accurately detect automated and increasingly complex fraud attempts.

Recent research from the Association of Certified Fraud Examiners (ACFE)

By Louis Columbus, 22 August 2019, 0 comments. Categories: Applications, Authentication, Employees, Security.

Global Cyber Alliance launches first cybersecurity development platform for IoT products

The Global Cyber Alliance (GCA) has launched a first-of-its-kind cybersecurity development platform for IoT products, called the Automated IoT Defence Ecosystem (AIDE), which allows small businesses, manufacturers, service providers and individuals to detect vulnerabilities, reduces risks and secure IoT devices against the increasing number of threats in today’s interconnected environment.

GCA ProxyPot, which is a...

By Enterprise CIO, 19 August 2019, 0 comments. Categories: Enterprise Mobility, IoT, Security.

Samsung SDS EMM attains NIAP Common Criteria certification

Samsung SDS America has announced that its enterprise mobility management (EMM) solution has secured a certification which will aid it for clients handling sensitive data.

Its EMM product has advanced to the evaluation stage of National Information Assurance Partnership (NIAP) Common Criteria certification for EMM compliance with the security requirements of the Mobile Device Management Protection Profile (MDM-PP) version 4.0.

By Enterprise CIO, 16 August 2019, 0 comments. Categories: Applications, Enterprise Mobility, Security.

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The report, which tracked...

By Enterprise CIO, 08 August 2019, 0 comments. Categories: Authentication, Malware, Security.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Why passwords are the weakest defence in a Zero Trust world

  • 90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG.
  • 86% of CIO, CISO and Security VPs would abandon password authentication if they could.
  • Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for replacing passwords.
  • There is a direct correlation between the number of times a user authenticates and the number of user access problems that need to be addressed.

These and many other fascinating insights...

By Louis Columbus, 24 July 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Protecting your organisation from phishing scams: A guide

The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams back in the spotlight, as this was an integral part of the company’s data breach. Unlike many other forms of cyberattack, phishing scams go after your customer or employee data, including credentials like passwords, financial details or sensitive personal information. This data can then be used or sold on for malicious intent, from identity theft or false transactions, to brute force or...

By Elad Schulman, 19 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.