Latest Security Opinions
Knowing how ransomware is evolving is key to protecting against it, writes Ezat Dayeh, Senior Engineer Manager UK&I at Cohesity.
We think of data breaches as a result of hackers battling an organisation’s defence systems for hours or days, frantically typing in reams of code in order to gain access to a database. The truth is, it’s often not like that at all. Criminals are lazy. They won’t fight tooth and nail to get into a target if they can sneak in elsewhere, and oftentimes, the job is actually made quite easy for them.
“Like most tech CEOs in 2020, I serve many constituents,” says Bob Lyons, CEO of fast-rising Managed Detection & Response (MDR) company Alert Logic. “Ultimately, my job is to create value for the three primary stakeholders of any business: customer, employee, and shareholder. I cannot fulfil that obligation to any one of them without addressing all of them.”
Organisations are struggling with how employees and external partners communicate. They were wrestling with the issue before the global pandemic but, with many workforces now regularly working outside of a traditional office, it has become a burning issue.
Email, the old stalwart, is slow and cumbersome. The fact email still exists – and is often the primary form of communication – demonstrates the failings of instant messaging, corporate communities, messaging apps, and collaboration tools.
The acronym DLP (Data Loss Prevention) conveys an unambiguous clue about the specific task this type of system is intended to solve: to thwart leaks of valuable information. Whereas this explains the general gist of such systems, the concept has embraced extra implications over time. Not only do the next-generation DLP solutions prevent intentional and accidental leaks, but they also help businesses tackle several additional security challenges.
Out of the 2376 data breaches reported to the UK ICO last year, 90 percent were caused by human error. Clearly, despite increased cyber awareness campaigns and untold time and money invested in cyber training, organisations are still struggling to shore up “The Human Layer”
The world is looking to telecoms operators to double down on reliability and security, says Bart Salaets, Senior Systems Engineering Director at F5 Networks.
It’s still commonly assumed that the cloud offers a less secure option compared to on-premises infrastructure. But what are the facts?
Privacy Shield’s invalidation shows data practices are under greater scrutiny than ever before. If they’re not already, sensible businesses should err on the side of caution
In the last few months, almost every business will have evaluated and, where necessary, updated its technology strategy and processes. Getting as close to business-as-usual has been a huge priority and focusing on operational infrastructure, communications, and collaboration tools and services has delivered widespread benefits.
But what about disaster recovery (DR)? How many organisations have reviewed and updated their approach to DR in line with their current situation? These are important questions that deserve specific attention, as plans that were in place for the ‘old normal’ might not be appropriate for rapidly changing circumstances. So, what are the current drivers of DR strategy and how can businesses ensure they can identify and adapt to any gaps in their approach?
As Vice President of Product Strategy at Limelight Networks, Steve Miller-Jones focuses on driving the long term product roadmap for the company with a focus on delivering the highest quality online experiences. In this Q&A, Steve explores the cyber threats brought into focus by online gaming.
Notwithstanding its benefits, Kubernetes can undermine organisations’ digital security if container admins don’t configure it correctly.