Monday , 24 April 2017


Has Defence-in-Depth failed us?

Anthony Perridge, Regional Director,

Defence-in-depth is a philosophy that we’re all familiar with, layering security controls throughout and IT systems so that if one fails or, if vulnerability is exploited, another is there to prevent an attack.  Having become standard practice for the vast majority, this sounds like a great approach, right? Well, perhaps wrong. If the slew of headlines about compromises and breaches ... Read More »

How to avoid being lost in the IoT explosion

Jordan O'Connor, Technical Lead EMEA,

IoT is having a profound effect on business. 57 per cent of all global businesses have adopted IoT practices and 72 per cent of those believe their company is more profitable since embracing IoT. With this large scalability, however, comes the potential for catastrophe. More connected devices bring new business challenges around scale, interoperability, security and the management of devices ... Read More »

Why 61% of hacked webmasters don’t receive a notification

As part of its #NoHacked campaign, Google released a report about website security trends, including hacking. Unfortunately, one of the major statistics within the report indicates there’s a lot of progress yet to be made in reducing successful hacks. That’s because, in 2016, the number of hacked sites went up by about 32 percent. Google’s representatives don’t expect that statistic ... Read More »

Non-malware is a ticking time bomb

Eric O'Neill. National Security Strategist,
Carbon Black

Non-malware is a massive and growing cybersecurity issue. Recent research from Carbon Black has shown that the issue is akin to a ticking time bomb with nearly two thirds (64%) of security researchers reporting that they’ve seen an increase in non-malware attacks since the beginning of 2016. The vast majority (93%) of security researchers surveyed also said non-malware attacks pose ... Read More »

Just another I.T. manic Monday? Automation can help

Brent Bluth,

Okay, it’s true. I’m a big fan of the song “Manic Monday” by The Bangles. Released in 1986 by Columbia Records, the song—written by Prince under the pseudonym “Christopher”—was the band’s first hit. It’s a sure bet Prince didn’t have the IT Service Management (ITSM) world in mind when he penned the lyrics. But after reading the research report “Anatomy ... Read More »

IoT Devices Are Powering Affordable DDoS-for-Hire Services

Duncan Hughes, Systems Engineering Director EMEA,
A10 Networks

For as long as there has been cyber crime, there have been illegal exploit kits for sale. Sure, these vary from the elementary to the advanced, but the malicious tools needed to commit cyber crime, theft, hacktivism or participate in run-of-the-mill online havoc are only a click away. But the raw power, scale and sophistication for sale via those clicks ... Read More »

The Quadfecta of Data Protection

Al Sargent, Sr. Director of Product Design,

This year alone, we have seen a hacker take control of a hotel’s key card system, locking guests in their room until a ransom was paid[1]; 2.5 million PlayStation and Xbox user credentials exposed[2] and Aberdeen city council’s website overrun with hackers — and those are just the ones who have admitted to it. It’s no wonder the occurrence of ... Read More »

Why business risk intelligence comes before digital risk monitoring

Josh Lefkowitz, CEO,

Everyone remembers the social media boom of the mid-2000s. While social networks such as MySpace and Friendster already existed and had fledgling ad revenue models, it wasn’t until the emergence of Twitter, Facebook’s acquisition of FriendFeed, and the development of tools such as HubSpot and HootSuite that businesses began to take social media seriously as a digital channel. Then, as ... Read More »

In the DDoS-for-hire business, customer service matters

Duncan Hughes, Director of Systems Engineering EMEA,
A10 Networks

You’re probably enrolled in an airline’s rewards programme, receiving points or miles to use toward free flights. The more you fly, the more points you get. It’s a way to recognise customer loyalty. Every type of business wants to build a loyal customer base. Even the cyber criminals who run DDoS-for-hire services. DDoS Loyalty Programs As the DDoS-for-hire racket evolves, ... Read More »

Don’t be a fool about endpoint protection

Kurt Wescoe, Chief Architect,
Wombat Security Technologies

In the U.S., 35 percent of working-age adults do not know what phishing is. Considering the average office worker can see up to one risky email a day, that’s quite alarming. Clearly, this awareness gap is putting both business data and systems at risk. Factoring end users into the endpoint protection equation just makes sense. Discussions about phishing prevention are ... Read More »