Monday , 27 March 2017


Shadow IT Is a Bigger Problem Than Most of Us Realize

Maybe you’ve only heard about shadow IT in passing or think it’s not very likely to impact your workplace, so it’s not important. It’ll soon be clear shadow IT is wreaking havoc in ways most people aren’t aware of, making it a worthwhile subject to discuss. Shadow IT Weakens Organizational Standards When you first started working at a new place, ... Read More »

Safeguarding Service Providers from the Evolving Threat Landscape

As service providers fortify infrastructure for the transition to 5G and to better defend against the increasingly menacing threat landscape, you need to ensure your networks and services are not only secure today, but well into the future. And it must be done while you continue to add new services to draw new customers and grow revenue. It’s a perfect ... Read More »

Security should be top priority for mobile developers to protect consumers

With the recent surge in fake apps tricking consumers out of personal data, experts are warning that manufacturers and developers of mobile devices need to make security a top priority in the design process to mitigate the serious risks posed by hackers. As recently as last month, numerous consumers fell foul of a fake Netflix app that infiltrated devices via ... Read More »

Organisations should embrace biometrics to reduce cost and risk of passwords

The active base of fingerprint reader-equipped devices is set to surpass one billion in early 2017, as stated by Deloitte, highlighting the rate that end users are warming to biometrics as a means of authentication. According to cyber security specialist Secure Cloudlink, organisations should follow this growing trend and incorporate biometric technology to authenticate employees in order to mitigate the ... Read More »

Imperva profile – Spencer Young: Ransomware is a war businesses must fight

Ransomware is the software phenomenon that has come to define the bleakness of our age. Where previous forms of malware – viruses, remote access Trojans, spyware – were seen as alien forms that had to be kept out at all costs, ransomware seems gradually to be overturning belief that defence is even possible. Symptomatic of this is the pragmatic way ... Read More »

50 Percent of Americans Don’t Trust Institutions to Protect Their Data

Have you had one – or many – of your accounts hacked? According to a report from Pew Research Center, a vast majority of Americans have. In fact, the study also shows that people believe cyberattacks are a way of life in today’s world. This may be a surprise to some, while to others it may not. In fact, 35 ... Read More »

IoT security flaws must be addressed immediately

The expected growth of the global Internet of Things (IoT) market will lead to increased security risks as hackers are presented with a greater surface area to compromise. This is according to Dave Worrall, CTO at Secure Cloudlink, who argues that passwords as a means of authentication have not been updated to cope with the rise of IoT and an ... Read More »

How can communications technology improve safety at sporting events?

Nick Hawkins,
Managing Director of Everbridge EMEA

Figures from the Global Terrorism Database (GTD) show that since 2012 there has been a rise in the number of deaths from terrorist attacks around the world. In 2015, 136 people died in the Paris attacks, 32 in Brussels and 84 on Bastille Day in Nice. How can event organisers and businesses ensure the safety of citizens, employees and tourists? What can we ... Read More »

ExtraHop Predicts 2017 Trends in IT, Security, and DevOps

ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today announced its top predictions for enterprise IT in 2017. Based on insight from customers, partners, and industry analysts and insiders, leaders at ExtraHop offer the following forecasts for IT in 2017: IT Demands Situational Awareness. “IT monitoring is no longer just about performance. ... Read More »

Marshalling DDoS defences for the Terabit era

For anyone involved with DDoS defence, 2016 will be remembered as the year of Mirai. Until the botnet’s spectacular attack on Internet company Dyn on 30 September, things had been going relatively well. DDoS attacks were up, of course, but probably no more than expected. The feared reflection attacks that exploit any one of a family of common Internet protocols ... Read More »