10 ways AI and machine learning are improving endpoint security

  • Gartner predicts $137.4 billion will be spent on information security and risk management in 2019, increasing to $175.5bn in 2023, reaching a CAGR of 9.1%. Cloud security, data security, and infrastructure protection are the fastest-growing areas of security spending through 2023.
  • 69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks with the majority of telecom companies (80%) saying they are counting on AI to help identify...

By Louis Columbus, 07 October 2019, 0 comments. Categories: Applications, App Platforms, Authentication, Security.

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

How AI is predicting the future of online fraud detection

Bottom line: Combining supervised and unsupervised machine learning as part of a broader artificial intelligence (AI) fraud detection strategy enables digital businesses to quickly and accurately detect automated and increasingly complex fraud attempts.

Recent research from the Association of Certified Fraud Examiners (ACFE)

By Louis Columbus, 22 August 2019, 0 comments. Categories: Applications, Authentication, Employees, Security.

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The report, which tracked...

By Enterprise CIO, 08 August 2019, 0 comments. Categories: Authentication, Malware, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How Disney's ‘guestology’ theory for customer experience can improve IT support

It has been a few years now since Bruce Laval first coined the phrase ‘guestology’ for The Walt Disney corporation as a philosophy of how to maintain the ‘magic’ of the Walt Disney World resort.

A key factor of the theory is that what appears in front of the customer is always the finished product – all the characters and themes always in the right place and never seen in an area they should not be...

By Anthony Lamoureux, 17 August 2018, 0 comments. Categories: Authentication, Cloud , Employees.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

Malicious and imitation apps continue to proliferate – so how can your organisation stay safe?

It has been a tough quarter when it comes to application security, according to RiskIQ’s latest mobile threat landscape report, with an increase in malicious apps flooding the marketplace, new mobile botnets, and imitation and trojan apps making it through official app store borders.

The report, which analysed 120 mobile app stores and more than two billion daily scanned resources, found that Google’s percentage of malicious apps fell to a low of 4% this quarter, having been at 8% in Q2. Yet this...

By James Bourne, 12 December 2017, 0 comments. Categories: Authentication, Employees, Enterprise Mobility, Research, Security.

Get on board with biometrics and your organisation will be better trusted

A majority of consumers would be more likely to trust organisations if they were to use biometrics for authentication, according to a new study from Unisys.

The study, which polled more than 3,500 consumers across seven countries in Europe, found more than two thirds (68%) would trust biometric-friendly organisations more than others. 63% of respondents believe that biometrics are more secure than traditional PIN and password methods, with 57% there adding fingerprint scanning was the most secure form of...

By James Bourne, 06 December 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

Cybersecurity for digital transformation: A guide

Digital transformation is all about change, agility, connectivity and meeting today’s users’ expectations. And no matter what industry you’re in, it will play a huge role in the future of your business.

In the eyes of many, though, cybersecurity stands in the way of all this. But it’s still an essential part of your strategy. So, looking forward, you need to ensure you have robust policies in place. As well as a full understanding of cybersecurity’s role in the digital...

By Tim Isaac, 28 November 2017, 1 comment. Categories: App Platforms, Authentication, Enterprise Mobility, Security.

Gemalto’s new platform aims to safeguard enterprise data any time, anywhere

Security provider Gemalto has launched a centralised cloud-based services platform to help enterprises safeguard data, meet compliance mandates, and secure crucial information any time and from anywhere.

According to the company, SafeNet Data Protection On Demand helps resolve issues related to cost and complexity of shielding data by providing a single data security-as-a-service platform. The platform can easily integrate with the existing IT systems, DevOps tools and cloud services to protect wherever data...

By Enterprise CIO, 06 November 2017, 0 comments. Categories: Authentication, Identity, IoT, Security.