Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

By Liviu Arsene, Senior e–Threat Analyst at Bitdefender Despite the prevalence of the technologies, a degree of confusion remains around the difference between machine learning (ML) and artificial intelligence (AI). The distinction lies in the fact that machine learning is the practical implementation of artificial intelligence – the use of algorithms to analyse volumes of quantitative and qualitative data, establishing findings and making statistical inferences based on analyzed data. From a cybersecurity perspective, this process...

Read more

By Trevor Dolan, Segment Director at Kollective It’s a great time to work in IT. In 2018, the role of IT is  now seen as a key business function rather than a cost cutting one. IT is helping businesses progress in the current digital climate, managing processes so employees can be more productive, and helping innovation thrive. While IT may be at the forefront of all of these processes, one area where it is still...

Read more
Hacker

As a hacker, I found vulnerabilities like easy-to-guess passwords made my work much easier. If that attack vector didn't pan out, I could usually get around the authentication flow, or gain basic privileges and escalate them for admin access. We must accept that these vulnerabilities – imperfect authentication and passwords - are not going away anytime soon, and businesses must take steps to strengthen their security posture with this in mind. A key challenge in...

Read more

IT has emerged as a business enabler in the UK; recent research from ManageEngine reveals that UK companies are excelling at aligning their overall business with IT. While business professionals working outside of the IT department are reportedly exhibiting strong IT knowledge, IT managers are also showing a greater understanding of their business as a whole. The survey results gathered from over 200 IT decision makers should be welcome news for UK businesses striving to...

Read more

By Anthony Perridge, International Vice President, ThreatQuotient Traditionally, the mission of the CISO has been to convince the CEO of the capabilities the organisation must put in place to prevent and follow-up on threats and manage crises. At the helm of IT security, CISOs are in their element overseeing the security operations centre (SOC), incident response teams and forensics experts to address threats. But now, many are being forced outside of their comfort zone. With...

Read more

By Kristofer Mansson, Global CEO, Silobreaker Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersecurity space. 2018 will be no different. One area that has recently got a lot of attention is IoT devices, as the use of such devices has increased in both the public and private sectors. Here at Silobreaker we are keen to highlight three pressing cyber threats to IoT...

Read more

Written by Kristofer Mansson, CEO, Silobreaker Driven by digital innovation, business operations have undergone a fundamental transformation over the past decade. And as businesses have moved forward, the fundamentals of cybersecurity have followed behind: What are the weak points in my security strategy? Who are the main threats to my operations? Where am I at risk of compromise? As the shift to a digital marketplace has gathered speed, so has the potential for exposure and...

Read more

By Martin Ewings, Director of Specialist Markets, Experis UK businesses are facing a series of regulatory demands, including the much talked about GDPR, which is now fewer than 65 days away. Compliance has become a key boardroom issue – with fines for GDPR breaches set at 4% of annual turnover or €20m, whichever is greater. But this also introduces new IT Security challenges; businesses will not only have to improve processes for reporting breaches but also...

Read more

Jalal Bouhdada, Founder and Principal ICS Security Consultant for Applied Risk It is perhaps no surprise that a new attack group, dubbed Orangeworm, has been discovered targeting the healthcare industry. There have been repeated warnings that healthcare systems are easy pickings for cybercriminals, and although there has been an understandable desire within the industry to press ahead and unlock the benefits of IoT technology, a lack of consideration regarding the security ramifications of this has...

Read more

The manufacturing industry is among the most advanced in the world for its adoption of digital platforms. Robotic and connected sensor technology are now mainstream throughout most factories, allowing manufacturers to gather insights in real time. The use of digital technology in manufacturing is nothing new, it has been embedded within processes for decades, and routine disruption has become the norm given the industry’s reliance on technology. However, increasing automation, data-rich production cycles and complex...

Read more
Page 10 of 69 1 9 10 11 69