Friday , 26 May 2017


Cybersecurity Best Practices to Win the Game of Chasing Tails

Duncan Hughes,
Systems Engineering Director, EMEA, A10 Networks

When it comes to our cyber activity, it seems that we are playing a never-ending game of chasing tails with cyber criminals. The more our technologies advance and adapt, so criminals are finding new and sneakier ways to break into systems and take personal and sensitive data hostage. Unsuspecting industries such as healthcare and hospitality are unwittingly becoming the biggest ... Read More »

The GDPR: The SME approach to the ‘Right to be Forgotten’

Dr Guy Bunker,
SVP of Products, Clearswift

With just one year to go, businesses in the UK are looking for a practical approach to preparing for the GDPR and its more challenging aspects, in particular the ‘right to be forgotten’ (RTBF). From May 25th 2018 onwards, if a company is presented with an RTBF request, they will have 30 days in which to find that individual’s information ... Read More »

Role-based Access Control: Access, security, info tracking

Dean Wiech,
Managing Director at tools4ever US

Access to data is of the highest concern for leaders of the world’s most complex businesses. The amount of data stored on any network is typically immense. Relating this data to your user’s account information in Active Directory can be tricky and time consuming, yet there are security concerns that must be addressed. In this regard, proper data security includes ... Read More »

WannaCry? Not really. A report from the 11th Eskenzi PR IT Analyst and CISO Forum

Bob Tarzey, Analyst and Director,
Quocirca Ltd.

May 16th and 17th 2017 saw Eskenzi PR stage its 11th 2-day IT Security Analyst Forum, as usual, in London. The morning of the second day (which was a Wednesday) was the customary CISO (chief information security officer) roundtable. A coming together of 20 or so IT security leaders from blue chip UK enterprises and public sector organisations to share ... Read More »

Cloud Encryption: Bring Your Own Key Is No Longer Enough

Matt Landrock, Executive Vice President,

‘Trust’ can be both a terrific enabler and a severe inhibitor in cloud services adoption. Keen to benefit from the cloud’s promise of flexible and scalable on-demand computing, businesses everywhere continue to migrate increasing volumes of critical data off-site and into the hands of third party cloud service providers. Each time this happens, however, they must answer the same question: ... Read More »

Unfragmenting Security with Threat Intelligence

Anthony Perridge,

Written by Anthony Perridge, Regional Director, ThreatQuotient It has often been said that complexity is the enemy of security. It is a simple statement but, nonetheless, one that holds true time and time again. The more complex your infrastructure, the more likely it is to have seams with exposed vulnerabilities. This is exactly what hackers are looking for, places where ... Read More »

Combat the DDoS of Things with These 5 Simple Tactics

Duncan Hughes,
A10 Networks

By Duncan Hughes, Systems Engineering Director, EMEA, A10 Networks Threat actors have weaponised the Internet of Things (IoT) and connected devices. They’re using unsecured IoT devices and creating botnets to launch catastrophic distributed denial of service (DDoS) attacks. This has given rise to the DDoS of Things (DoT). Fueled by headline-making malware like Mirai and Leet, these DDoS attacks have reached unprecedented levels ... Read More »

Are your employees unconvinced about your processes?

Sue Trombley,
Iron Mountain

By Sue Trombley, managing director of thought leadership at Iron Mountain  Businesses around the world are upgrading the way they manage their information, moving from records and information management (RIM) to information governance (IG). More operational or tactical in scope, RIM describes the activities and tasks required to organise, secure, access and ultimately destroy information. IG can be described as ... Read More »

The Age of NGAV Has Arrived and It’s Here to Stay

Mike Viscuso, CTO,
Carbon Black

The tide is shifting when it comes to replacing legacy antivirus. Five years ago, maybe 10 percent of organisations said they were ready to replace it. Today, that number is about 80 or 90 percent.  A big part of the desire to shift has to do with the evolving attack landscape – specifically the increase seen in non-malware attacks. Recent ... Read More »

Sadiq Is Right: Why London Needs A Chief Digital Officer

Dale Lovell, Chief Digital Officer and UK Managing Director,

Dale Lovell, Chief Digital Officer and UK Managing Director (MD) at ADYOULIKE said of London Mayor Sadiq Khan recruiting for London’s first ever Chief Digital Officer: “Ten years ago the job of Chief Digital Officer simply didn’t exist. Even as late as 2013, there were only 500 CDOs across the globe. The ‘digital’ aspect of organisations was also something that ... Read More »