How automation will help enterprises overcome the cybersecurity skills gap

There are few verticals that can boast a 0% unemployment rate, but cybersecurity is one of them. There are far more job openings than there are skilled professionals to fill them. This is despite many efforts to train, upskill and reskill people to close this talent gap. With almost three million unfilled cybersecurity positions around the world, the industry needs to come to grips with the serious nature of this skills gap.

The speed at which the threat landscape is...

By Mike Armistead, 06 December 2019, 0 comments. Categories: CIO, Data & Analytics, Employee Education, Employees, Security.

Can serialisation be the future of food industry traceability?

Serialised box tracking has been standard practice in the beef and poultry industries for a long time – and the entire food space may follow suit if serialised tracking becomes a mandatory requirement.

The US has already adopted serialisation regulation in the pharmaceutical market through the Drug Supply Chain Security Act – the FDA acting to introduce carton and case serialisation to combat illegal and...

By Simon Noakes, 03 December 2019, 0 comments. Categories: Productivity, Security.

The seven signs which mean it’s time to get focused on Zero Trust security

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of this year alone, according to

By Louis Columbus, 02 December 2019, 0 comments. Categories: Data Loss, Employees, Enterprise Mobility, Security.

What’s new on Forrester’s Zero Trust security landscape in 2019: From theory to integration

  • Forrester added in Checkpoint, Forescout, Google, illumio, MobileIron, Proofpoint, Symantec, and Unisys in their latest Forrester Wave Zero Trust eXtended Ecosystem Platform Providers this year
  • Forrester’s 2019 scorecard increased the weight on network security, automation and orchestration, and portfolio growth rate compared to last year, adding in Zero Trust eXtended (ZTX) ecosystem advocacy to the...

By Louis Columbus, 29 November 2019, 0 comments. Categories: Applications, CIO, Employees, Security.

How three digital banks have been targeted in account takeover scams – and how to avoid it

Financial services companies have always been primary targets for scammers, with account takeover the ultimate prize. If successful, phishing scams reward attackers with sensitive data they can use for financial gain, identity theft, or brand damage.

With this in mind, Segasec monitored several prominent digital banks between October 17 and November 5. The research uncovered hundreds of dangerous URLs and many live...

By Elad Schulman, 26 November 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Malware, Security.

Allison Cerra, CMO, McAfee: On education and mindfulness in removing cybersecurity complexity

If you’re going to write a playbook around cybersecurity best practice, as a leading executive of one of the major security companies, then it may be a wise idea to deal with any skeletons in the cupboard before dispensing the pellets of wisdom.

Thankfully Allison Cerra, senior vice president and chief marketing officer at McAfee, does so in her new book with integrity, grace, and no little wit.

In April 2017, as

By James Bourne, 25 November 2019, 0 comments. Categories: Case Studies, CIO, Data & Analytics, Employee Education, Employees, Security.

Are we doing enough to secure our digital business? Why automation is the answer

To nobody’s shock, security shortcomings exist everywhere. Take senior IT leaders and the customers they serve. These customers believe IT leaders have taken every security precaution possible, yet any knowledgeable IT professional can look at their setup and see gaps. Unfortunately, the disparity between perceived protection and actual exposure also exists at the enterprise level.

By Yoni Leitersdorf, 19 November 2019, 0 comments. Categories: App Platforms, Data & Analytics, Data Loss, Employees, Security.

Financial services firms rely on BYOD – so how do they stay secure?

Bottom line: 2020 is going to be the year companies launch more digital business initiatives that depend on BYOD than ever before, making Zero Trust Security a key contributor to their success.

Financial services firms are at an inflection point going into 2020. Mobile-first products and services now dominate their product roadmaps for next year, with applications’ speed and security being paramount. In fintech, DevOps teams have been working with

By Louis Columbus, 15 November 2019, 0 comments. Categories: BYOD, Employees, Enterprise Mobility, Security.

Lack of communication between CEO and CISOs put organisations at risk of cyberattacks, says Australian study

The latest research report from Unisys has revealed a major persisting issue between two members of the C-suite that could put organisations at greater risk of cyber-attacks.

The study, which surveyed 88 CEOs and 54 CISOs from Australian small-to-medium businesses, found that many CEOs still see cyber-security in tactical terms and thus failing to integrate safeguard essential digital assets into their strategic planning.

By Enterprise CIO, 14 November 2019, 0 comments. Categories: CIO, Data & Analytics, Employees, Security.

Why improving endpoint security needs to be a primary enterprise goal in 2020

Bottom line: Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have cybersecurity goal for next year.

Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organisations’ endpoints with increasing frequency....

By Louis Columbus, 11 November 2019, 0 comments. Categories: Cloud , Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

Five strategies healthcare providers are using to secure their networks

  • Healthcare records are bestsellers on the Dark Web, ranging in price from $250 to over $1,000 per record
  • The growing, profitable market for Protected Health Information (PHI) is attracting sophisticated cybercriminal syndicates, several of which are state-sponsored
  • Medical fraud is slower to detect and notify, unlike financial fraud (ex. stolen credit cards), contributing to its popularity with cybercriminals globally
  • Cybercriminals prefer PHI data because it’s easy to sell and contains information that is harder to cancel or secure once stolen. Examples include insurance policy...

By Louis Columbus, 08 November 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

There’s always one rotten app in the bunch: Google launches App Defense Alliance

Google has announced the founding of the App Defense Alliance to help defend the company’s app store from bad actors – with security partners ESET, Lookout and Zimperium all on board.

The move will see the Google Play Protect detection systems for malicious apps integrated with the scanning engines of each partner. The partnering companies were chosen specifically for their specialisms in endpoint protection and...

By James Bourne, 08 November 2019, 0 comments. Categories: Android, Applications, App Platforms, Enterprise App Stores, Malware, Security.

Using AI to secure the modern world – where enterprises are particularly vulnerable

The types of threats that are targeting enterprises are evolving and completely different to what they were a decade ago. Enterprise attacks are no longer executed by “lone wolf” hackers, but instead come from highly sophisticated and professional cybercriminal networks. Artificial Intelligence (AI) and machine learning (ML) can be harnessed by hackers to automatically seek out weaknesses in organisations’ ecosystems. 

By Brian Foster, 07 November 2019, 0 comments. Categories: Applications, App Platforms, Employees, Enterprise Mobility, Security.

Companies need to disclose their cybersecurity risk to attract investors, study finds

When one company experiences a cybersecurity breach, other companies in the same field become less attractive to investors. Yet new research argues that if organisations are open about their efforts, then a brighter picture emerges.

The research, from the North Carolina State University and involving 120 non-professional investors, found organisations that are open about their cybersecurity risk management do well than their peers...

By Enterprise CIO, 04 November 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

It’s time to solve the education sector’s cybersecurity crisis

  • There were a record 160 publicly-disclosed security incidents in the education sector (K-12) during the summer months of 2019, exceeding the total number of incidents reported in all of 2018 by 30%
  • 47% of K-12 organisations are making cybersecurity their primary investment, yet 74% do not use encryption
  • 93% of K-12 organisations rely on native client/patch management tools that have a 56% failure rate, with 9% of client/patch management failures never recovered

These and many other fascinating insights are from 

By Louis Columbus, 18 October 2019, 0 comments. Categories: Applications, Data & Analytics, Employees, Security.

10 ways AI and machine learning are improving endpoint security

  • Gartner predicts $137.4 billion will be spent on information security and risk management in 2019, increasing to $175.5bn in 2023, reaching a CAGR of 9.1%. Cloud security, data security, and infrastructure protection are the fastest-growing areas of security spending through 2023.
  • 69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks with the majority of telecom companies (80%) saying they are counting on AI to help identify...

By Louis Columbus, 07 October 2019, 0 comments. Categories: Applications, App Platforms, Authentication, Security.

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.