Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.

Why manufacturing supply chains need Zero Trust security

  • According to the 2019 Verizon Data Breach Investigation Report, manufacturing has been experiencing an increase in financially motivated breaches in the past couple of years, whereby most breaches involve Phishing and the use of stolen credentials.
  • 50% of manufacturers report experiencing a breach over the last 12 months, 11% of which were severe according to Sikich’s 5th Manufacturing and Distribution Survey, 2019.
  • Manufacturing’s most commonly data compromised includes credentials (49%),...

By Louis Columbus, 06 September 2019, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC) professionals across enterprise...

By James Bourne, 02 September 2019, 0 comments. Categories: CIO, Collaboration, Data Loss, Employee Education, Employees, Research, Security.

Tackling cybercrime one step at a time: How businesses can stay connected and protected

As concern around cyber security continues to rapidly grow and threats become increasingly complex, the challenges faced by businesses are mounting considerably. In fact, when assessing the cyber security risk, it is no longer a question of if a business will be attacked, but when.

Today, significant cyber security breaches are becoming commonplace in newspaper headlines, with British Airways among one of the latest organisations to face the consequences of a data breach. This resulted in around 500,000...

By Shani Latif, 22 August 2019, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Protecting your organisation from phishing scams: A guide

The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams back in the spotlight, as this was an integral part of the company’s data breach. Unlike many other forms of cyberattack, phishing scams go after your customer or employee data, including credentials like passwords, financial details or sensitive personal information. This data can then be used or sold on for malicious intent, from identity theft or false transactions, to brute force or...

By Elad Schulman, 19 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Why AI cybersecurity is a leap forward in threat intelligence

No sector is immune from cyber attacks and attackers do not discriminate against size of organisation. The objective may be financial or even political, what is certain is that the increasing level of sophistication means that they present some of the most the most strategically significant risks to business today.

Cybersecurity is driven by the need to remain one step ahead of the attacker. As...

By Neil Kell, 11 July 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Data Loss, Security.

How Walmart – among others – fell victim to recent customer phishing scams

One thing we know about consumer-focused cyber criminals is they’re more likely to strike during busy shopping periods. Black Friday – the day after Thanksgiving – and Cyber Monday, the first Monday after the holiday, are well-known to be hotbeds of cyber-criminal activity.

With this in mind, in the days leading up to Mother’s Day and Memorial Day 2019, Segasec monitored several large US-based retailers...

By Elad Schulman, 03 July 2019, 0 comments. Categories: Data Loss, Privacy, Research, Security.

How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

It’s not me, but it is probably you: How IT still views employees with contempt on cybersecurity

A new report from software as a service (SaaS) operations management and security platform BetterCloud begins with a blunt message. “While cybercriminals, hacktivists and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you.”

According to the study, which featured survey data from 500 IT professionals, the ‘well-meaning but...

By James Bourne, 03 April 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Not if, but when: The value of cybersecurity awareness

For businesses, a cyber-attack is not a matter of “if” but “when”. Every business is at risk of a cyber-attack. In 2018 alone, cyber-attacks on organisations cost the UK economy tens of billions of pounds, with 7 out of 10 companies falling victim to a cyber-attack or breach.

According to the 2017 Data Breach Investigations Report, more than

By Vinaya Sheshadri, 26 March 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

CXOs increasingly suspicious of employees when it comes to data breaches

When a data breach occurs – and unfortunately today it is a question of when rather than if – then looking for the responsible party and safeguarding against future events is a matter of course. Yet according to new data from security provider Egress, the C-suite differs from their employees in terms of who is to blame.

The study, which polled more than 250 CXO executives and 2000 employees across the UK and US,...

By James Bourne, 25 March 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.