Latest Security Opinions
All signs suggest digital health passports are a matter of when, not if.
Companies across all critical infrastructure sectors – from power plants to healthcare to manufacturing – must assume that sophisticated attackers are already inside the network.
Calculating cybersecurity ROI helps CISOs determine the value of an offering for their unique security environment. Here are four ways security leaders can crunch the numbers.
No business is invulnerable. All are exposed to the same environmental and man-made risk factors. The key is being able to mitigate against those risks as much as possible, putting steps in place to ensure business continuity as – and when – disasters occur. That’s where disaster recovery comes in, and as cyberthreats and natural disasters continue to grow in scope and severity, DRaaS is going to play a key role in ensuring businesses can operate safely, securely and with full confidence.
Knowing how ransomware is evolving is key to protecting against it, writes Ezat Dayeh, Senior Engineer Manager UK&I at Cohesity.
We think of data breaches as a result of hackers battling an organisation’s defence systems for hours or days, frantically typing in reams of code in order to gain access to a database. The truth is, it’s often not like that at all. Criminals are lazy. They won’t fight tooth and nail to get into a target if they can sneak in elsewhere, and oftentimes, the job is actually made quite easy for them.
“Like most tech CEOs in 2020, I serve many constituents,” says Bob Lyons, CEO of fast-rising Managed Detection & Response (MDR) company Alert Logic. “Ultimately, my job is to create value for the three primary stakeholders of any business: customer, employee, and shareholder. I cannot fulfil that obligation to any one of them without addressing all of them.”
Organisations are struggling with how employees and external partners communicate. They were wrestling with the issue before the global pandemic but, with many workforces now regularly working outside of a traditional office, it has become a burning issue.
Email, the old stalwart, is slow and cumbersome. The fact email still exists – and is often the primary form of communication – demonstrates the failings of instant messaging, corporate communities, messaging apps, and collaboration tools.
The acronym DLP (Data Loss Prevention) conveys an unambiguous clue about the specific task this type of system is intended to solve: to thwart leaks of valuable information. Whereas this explains the general gist of such systems, the concept has embraced extra implications over time. Not only do the next-generation DLP solutions prevent intentional and accidental leaks, but they also help businesses tackle several additional security challenges.
Out of the 2376 data breaches reported to the UK ICO last year, 90 percent were caused by human error. Clearly, despite increased cyber awareness campaigns and untold time and money invested in cyber training, organisations are still struggling to shore up “The Human Layer”
The world is looking to telecoms operators to double down on reliability and security, says Bart Salaets, Senior Systems Engineering Director at F5 Networks.
It’s still commonly assumed that the cloud offers a less secure option compared to on-premises infrastructure. But what are the facts?