Wednesday , 20 June 2018


How can real-time payments be secured?

David Worthington,

David Worthington, VP, Payments at Rambus In today’s on-demand world, we expect to be able to spend, move and receive money instantly. For this reason, real-time payments (RTP), also known as ‘faster payments’ or ‘instant payments’, are gaining momentum globally. Accenture estimates that there are now 35 countries with real-time payment schemes in operation or under development. With account-based fraud ... Read More »

Back to basics: Ten Tips for Outsmarting Ransomware

Steve Mulhearn,

By Steve Mulhearn, Director of Enhanced Technologies, Fortinet Just one year ago, the WannaCry ransomware attack made global headlines when it hit 230,000 computers, creating total chaos. A number of high-profile organisations have continued to be targeted by this ransomware, some quite recently. Just a few weeks ago, the Atlanta police department fell victim to a ransomware attack which cost them ... Read More »

Are you the biggest threat to your employer?

David Higgins,

David Higgins, Director of Customer Development, EMEA at CyberArk  The trusted insider has always been a security risk – whether an executive with access to sensitive information or an administrator on an enterprise network. But according to a recent report from the Ponemon Institute, in the past two years the insider threat has rocketed for businesses, with the average number ... Read More »

We need to talk about application security

Owen Pendlebury,
OWASP Foundation

Owen Pendlebury, Global Board of Directors at OWASP Foundation     Threats to the application layer is not a new thing, but it has been becoming more and more prevalent over the past number of years. The rise in attacks stems from the increase in high-value data being stored in constantly changing environments. Akamai found the number of application attacks ... Read More »

In the New “Wild West” Even “Small” Cryptocurrency Theft is Costing Billions

Rick McElroy,
Carbon Black

Written by Rick McElroy, Security Strategist at Carbon Black Over the weekend, another cryptocurrency exchange was breached. This time it was “only” $40 million” in cryptocurrency. However, as a result cryptocurrencies overall lost more than $40 billion in value following the attack. That’s not a typo – a $40 million heist cost the market more than $40 billion dollars. Such ... Read More »

Does Your Business Really Know How To Handle A Data Breach?

Sandra Bell, Head of Resilience Consulting,
Sungard Availability Services

Whilst data breaches can result in substantial fines that can hit company finances hard, they have many, often more immediate, impacts. Businesses that do not respond quickly and decisively at the first sign of a data breach will find themselves constantly struggling to play catch-up. This means that when the fine hits they are often in such a weakened state ... Read More »

Trickbot and IcedID Botnet Operators Collaborate to Increase Impact

Vitali Kremez, Director of Research,

It wasn’t too long ago when different banking malware competed for victims, often seeking out and uninstalling one another upon compromising machines. Now, in what may indicate a shift toward more collaboration among cybercrime groups, the operators of the “IcedID” and “TrickBot” banking Trojans appear to have partnered and are likely sharing profits, based on operation details. Flashpoint analysts recently examined samples that indicate computers ... Read More »

For enterprise cyber defence, there should be more than one solution

Ronald Sens,
A10 Networks

By Ronald Sens, EMEA Director, A10 Networks Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of ... Read More »

Outdated VPN remote access puts critical national infrastructure organisations at risk

Paul Darby,

Written by Paul Darby, Regional Director – EMEA, Vidder When VPNs were first developed back in the 1990s, the idea was to extend the LAN to employees’ home offices and hotels as they hit the road. This meant giving employees remote access to everything their company network had to offer—just as if they were working on the internal network. Then, ... Read More »

Why every CISO should be worried about ‘cryptojacking’

Tyler Moffitt,

Tyler Moffitt, Senior Threat Research Analyst at Webroot Last year saw an unprecedented rise in the popularity of cryptocurrency, as the value of the currency soared across the market. In September 2017, CoinHive debuted a Javascript code to mine the cryptocurrency Monero, as an alternative means for website owners to generate revenue without using ads. Visitors to the site would ... Read More »