Thursday , 22 February 2018


Data Breach Risks 2.9 Million Norwegians’ Health Care Information

Norway was among the latest successful targets for cybercriminals, and this recent attack involved health information. The victimized organization was Health South-East RHF, which manages hospitals in nine Norwegian counties in the southeastern part of the country. It received a notification on Jan. 8 when HelseCERT, a computer response team for the health sector, advised the company of suspicious traffic ... Read More »

New Report: 30% of CEO Emails Exposed in Breaches

The phrase “new normal” usually offers little comfort — particularly when stolen secrets are in the mix. It’s true. Data breaches have become so commonplace that we’re nearly numb to them. But now a new report indicates, the damage might be more widespread than any of us wanted to believe. As many as 30 percent of CEOs may have had ... Read More »

Tenable Network Security profile – Gavin Millard: unsecured application containers are creating big risks

These might be boom times for anyone involved in application containerisation but lurking just under the surface are a host of security issues that development teams are only now starting to get to grips with. It’s an old story for the security industry that has played out numerous times in the past: a new technology arrives on the back of ... Read More »

How backup can help businesses never be held hostage by ransomware

Richard Agnew, VP NW EMEA,

Paying ransom fees to regain access to data in the vague hope that criminals will release files from hostage is a known phenomenon that continues to demand regular column inches. But currently, with ransomware on the rise, no company wants to get into the habit of paying out a ransom fee to access their own services. Ransomware threats reached an ... Read More »

The end of the “It’ll never happen to me” mentality

Stephen Morrow, Principle Security Consultant,

Take security seriously The end is nigh. More and more data breaches are happening each day and more information is being stolen than ever before. Attack vectors such as distributed denial of service (DDoS) and Ransomware are on the rise. The former taking out half of the Internet last October when global DNS server Dyn got hit by a huge ... Read More »

Giving millennials the keys to a kingdom without borders

By Al Sargent, Sr. Director of Product Marketing,

From mobile phones to WiFi door locks and ingestible smart pills, connected devices that make up the Internet of Things are entering our offices, home, and even bodies at an astonishing rate. Such devices were once a distant figment of our imagination or something only dreamt up in a Sci-Fi film, but we’re quickly becoming dependent on them to track ... Read More »

Misguided justifications for not remediating vulnerabilities

Evan Oslick, Software Security Developer,

According to Nuix’s recent Black Report, 75% of organisations only perform limited remediation after a penetration test. To take the positives, it’s good that organisations are paying attention to critical vulnerabilities. However, the report also shows that 64% of penetration testers say their biggest frustration is that organisations do not fix the things they know are broken. Product and system ... Read More »

Shadow IT Is a Bigger Problem Than Most of Us Realize

Maybe you’ve only heard about shadow IT in passing or think it’s not very likely to impact your workplace, so it’s not important. It’ll soon be clear shadow IT is wreaking havoc in ways most people aren’t aware of, making it a worthwhile subject to discuss. Shadow IT Weakens Organizational Standards When you first started working at a new place, ... Read More »

Safeguarding Service Providers from the Evolving Threat Landscape

As service providers fortify infrastructure for the transition to 5G and to better defend against the increasingly menacing threat landscape, you need to ensure your networks and services are not only secure today, but well into the future. And it must be done while you continue to add new services to draw new customers and grow revenue. It’s a perfect ... Read More »

Security should be top priority for mobile developers to protect consumers

With the recent surge in fake apps tricking consumers out of personal data, experts are warning that manufacturers and developers of mobile devices need to make security a top priority in the design process to mitigate the serious risks posed by hackers. As recently as last month, numerous consumers fell foul of a fake Netflix app that infiltrated devices via ... Read More »