Latest Security Opinions

Ransomware – the gift that keeps on taking

Knowing how ransomware is evolving is key to protecting against it, writes Ezat Dayeh, Senior Engineer Manager UK&I at Cohesity.

Learning from data breaches: The importance of the fundamentals

We think of data breaches as a result of hackers battling an organisation’s defence systems for hours or days, frantically typing in reams of code in order to gain access to a database. The truth is, it’s often not like that at all. Criminals are lazy. They won’t fight tooth and nail to get into a target if they can sneak in elsewhere, and oftentimes, the job is actually made quite easy for them.

CEO Interview: Alert Logic’s Bob Lyons on the future of MDR

“Like most tech CEOs in 2020, I serve many constituents,” says Bob Lyons, CEO of fast-rising Managed Detection & Response (MDR) company Alert Logic. “Ultimately, my job is to create value for the three primary stakeholders of any business: customer, employee, and shareholder. I cannot fulfil that obligation to any one of them without addressing all of them.”

Does corporate messaging and collaboration demand decentralisation?

Organisations are struggling with how employees and external partners communicate. They were wrestling with the issue before the global pandemic but, with many workforces now regularly working outside of a traditional office, it has become a burning issue.

Email, the old stalwart, is slow and cumbersome. The fact email still exists – and is often the primary form of communication – demonstrates the failings of instant messaging, corporate communities, messaging apps, and collaboration tools.

Next-generation DLP systems and the problems they solve

The acronym DLP (Data Loss Prevention) conveys an unambiguous clue about the specific task this type of system is intended to solve: to thwart leaks of valuable information. Whereas this explains the general gist of such systems, the concept has embraced extra implications over time. Not only do the next-generation DLP solutions prevent intentional and accidental leaks, but they also help businesses tackle several additional security challenges.

CEO Interview: Demystifying the Human Layer, with Egress’ Tony Pepper

Out of the 2376 data breaches reported to the UK ICO last year, 90 percent were caused by human error. Clearly, despite increased cyber awareness campaigns and untold time and money invested in cyber training, organisations are still struggling to shore up “The Human Layer”

The world needs security and reliability – telcos must deliver

The world is looking to telecoms operators to double down on reliability and security, says Bart Salaets, Senior Systems Engineering Director at F5 Networks.

How secure is the cloud in 2020?

It’s still commonly assumed that the cloud offers a less secure option compared to on-premises infrastructure. But what are the facts?

Privacy Shield abandonment shows businesses need to up their data protection

Privacy Shield’s invalidation shows data practices are under greater scrutiny than ever before. If they’re not already, sensible businesses should err on the side of caution

Businesses have adapted to meet pandemic challenges, but are disaster recovery strategies keeping up?

In the last few months, almost every business will have evaluated and, where necessary, updated its technology strategy and processes. Getting as close to business-as-usual has been a huge priority and focusing on operational infrastructure, communications, and collaboration tools and services has delivered widespread benefits.

But what about disaster recovery (DR)? How many organisations have reviewed and updated their approach to DR in line with their current situation? These are important questions that deserve specific attention, as plans that were in place for the ‘old normal’ might not be appropriate for rapidly changing circumstances. So, what are the current drivers of DR strategy and how can businesses ensure they can identify and adapt to any gaps in their approach?

Q&A: Online gaming and cyber security, with Limelight Networks’ Steve Miller-Jones

As Vice President of Product Strategy at Limelight Networks, Steve Miller-Jones focuses on driving the long term product roadmap for the company with a focus on delivering the highest quality online experiences. In this Q&A, Steve explores the cyber threats brought into focus by online gaming.

Reducing the risk of misconfigured components in Kubernetes

Notwithstanding its benefits, Kubernetes can undermine organisations’ digital security if container admins don’t configure it correctly.