Sunday , 23 July 2017
Home » NEWS » OPINIONS & ANALYSIS

OPINIONS & ANALYSIS

Tenable Network Security profile – Gavin Millard: unsecured application containers are creating big risks

These might be boom times for anyone involved in application containerisation but lurking just under the surface are a host of security issues that development teams are only now starting to get to grips with. It’s an old story for the security industry that has played out numerous times in the past: a new technology arrives on the back of ... Read More »

How backup can help businesses never be held hostage by ransomware

Richard Agnew, VP NW EMEA,
Veeam

Paying ransom fees to regain access to data in the vague hope that criminals will release files from hostage is a known phenomenon that continues to demand regular column inches. But currently, with ransomware on the rise, no company wants to get into the habit of paying out a ransom fee to access their own services. Ransomware threats reached an ... Read More »

The end of the “It’ll never happen to me” mentality

Stephen Morrow, Principle Security Consultant,
SQS

Take security seriously The end is nigh. More and more data breaches are happening each day and more information is being stolen than ever before. Attack vectors such as distributed denial of service (DDoS) and Ransomware are on the rise. The former taking out half of the Internet last October when global DNS server Dyn got hit by a huge ... Read More »

Giving millennials the keys to a kingdom without borders

By Al Sargent, Sr. Director of Product Marketing,
OneLogin

From mobile phones to WiFi door locks and ingestible smart pills, connected devices that make up the Internet of Things are entering our offices, home, and even bodies at an astonishing rate. Such devices were once a distant figment of our imagination or something only dreamt up in a Sci-Fi film, but we’re quickly becoming dependent on them to track ... Read More »

Misguided justifications for not remediating vulnerabilities

Evan Oslick, Software Security Developer,
Nuix

According to Nuix’s recent Black Report, 75% of organisations only perform limited remediation after a penetration test. To take the positives, it’s good that organisations are paying attention to critical vulnerabilities. However, the report also shows that 64% of penetration testers say their biggest frustration is that organisations do not fix the things they know are broken. Product and system ... Read More »

Shadow IT Is a Bigger Problem Than Most of Us Realize

Maybe you’ve only heard about shadow IT in passing or think it’s not very likely to impact your workplace, so it’s not important. It’ll soon be clear shadow IT is wreaking havoc in ways most people aren’t aware of, making it a worthwhile subject to discuss. Shadow IT Weakens Organizational Standards When you first started working at a new place, ... Read More »

Safeguarding Service Providers from the Evolving Threat Landscape

As service providers fortify infrastructure for the transition to 5G and to better defend against the increasingly menacing threat landscape, you need to ensure your networks and services are not only secure today, but well into the future. And it must be done while you continue to add new services to draw new customers and grow revenue. It’s a perfect ... Read More »

Security should be top priority for mobile developers to protect consumers

With the recent surge in fake apps tricking consumers out of personal data, experts are warning that manufacturers and developers of mobile devices need to make security a top priority in the design process to mitigate the serious risks posed by hackers. As recently as last month, numerous consumers fell foul of a fake Netflix app that infiltrated devices via ... Read More »

Organisations should embrace biometrics to reduce cost and risk of passwords

The active base of fingerprint reader-equipped devices is set to surpass one billion in early 2017, as stated by Deloitte, highlighting the rate that end users are warming to biometrics as a means of authentication. According to cyber security specialist Secure Cloudlink, organisations should follow this growing trend and incorporate biometric technology to authenticate employees in order to mitigate the ... Read More »

Imperva profile – Spencer Young: Ransomware is a war businesses must fight

Ransomware is the software phenomenon that has come to define the bleakness of our age. Where previous forms of malware – viruses, remote access Trojans, spyware – were seen as alien forms that had to be kept out at all costs, ransomware seems gradually to be overturning belief that defence is even possible. Symptomatic of this is the pragmatic way ... Read More »