Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

Research from Corero Network Security has found that 80% of European IT security professionals expect DDoS ransom attacks to target their business within the next 12 months. A poll of experts at the InfoSecurity Europe conference made evident the fears of cyber extortion attempts in the UK and Europe. Furthermore, warnings were issued by the City of London Police in May this year following risks identified from warnings by Lizard Squad, who were threatening charges...

Read more

By Dave Worrall, CTO at Secure Cloudlink  The explosion of businesses transacting online, social media sites, mobile devices and applications in the workplace has led to each of us being faced with the challenge of needing to remember more usernames and passwords than ever before. Add to this the complexity of new cloud based applications, the rise of Shadow IT as well as BYOD, and the world of the IT manager suddenly becomes one of...

Read more

Browser privacy and security has become mired in a battle over the future of Internet publishing As if life wasn’t already hard enough for online publishers it has recently been getting a lot tougher thanks to adblockers. Loaded as free extensions to desktop and mobile browsers, up to a third of Internet users now run them which spells big trouble for the swathe of big websites that depend almost completely on serving ads to make...

Read more

The world has changed. With more users accessing data outside the corporate firewall and from mobile devices, businesses can now allow for more flexible work environments. But this increased access has also brought an upsurge in the risk of data breaches and threats from hackers. Recent high-profile breaches have heightened overall market awareness of security, not just within the CSO community, but among CEOs and boards of directors as well. Protecting the sensitive data within...

Read more

Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing what companies have actually been paying in light of cyber attacks. It turns out the answer is a LOT. Rsearch shows potentially billions of dollars has been lost through wire transfer fraud, ransom payments and other extortion and fraud techniques. How do these scams work? Listen to AppRiver's advice and...

Read more

Flashpoint, the global leader in Deep & Dark Web data and intelligence, today released the findings from a five-month study of an organized Russian ransomware campaign. The new research report, Inside an Organized Russian Ransomware Campaign delves into the details of how cybercriminals are using Ransomware as a Service (RaaS) to successfully target victims, with the healthcare industry being identified as a priority target.  The report reveals ransomware campaign key metrics, including average salaries for...

Read more

Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication. Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and passwords.  In...

Read more

Could M-Files have prevented the destruction of the Death Star? With the DVD release of “Star Wars VII: The Force Awakens” and the production of the next two thirds of the new trilogy underway, how could the Star Wars universe take some ideas from the real world and apply them to a galaxy far far away? Take for instance Quality Management Systems (QMS) and the construction of the first Death Star from “Star Wars IV:...

Read more

The Guru sat down with Glasswall Solutions' VP of Alliances, Chris Dye, and asked him about a range of topics – from cyber attacks on CNI to current security trends, weaponised documents to the future of cyber security. Should we be fearful of a cyber attack targeting critical infrastructure?  In a word, yes. We have seen a number of high-profile attacks in recent months, including on Israel’s Electricity Authority, California’s Hollywood Presbyterian Medical Centre, the parliament of Western Australia...

Read more

Cyber security is often stated as a problem organisations need to deal with, but it’s an issue which is never going to be completely fixed. Instead of viewing cyber security as a problem, organisations need to start viewing their cyber security as a game and cyber adversaries as challengers in that game. The difference being that problems, like 1+1, have a singular answer. Too much network traffic load for your security perimeter? That’s a problem...

Read more
Page 20 of 42 1 19 20 21 42