Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Virtualisation and software defined networking have transformed the IT infrastructure landscape over the past decade. As organisations look to minimise their hardware footprint, improve network flexibility and decouple applications from the infrastructure to gain agility and flexibility, the era of dedicated hardware-based solutions is over. Yet when it comes to securing the essential VoIP network, the vast majority of voice technology vendors still insist on deploying a hardware based Session Border Controller (SBC) – despite...

Read more

How much is my data worth? Not a question you might ask yourself when you’re in a hurry to complete the final level of a gaming app you’ve been trying to crack for weeks. You reach out to your contacts in the game for tips on how to progress, and Sarah125 sends you a link to a cheat guide. But Sarah125 isn’t a fellow gamer. She’s a cybercriminal. And she’s relying on you getting caught...

Read more

By Monica Eaton-Cardone, CIO and Co-Founder of Chargebacks911 As online shopping reaches its 2016 peak, merchants are concluding their final preparations, ensuring that they will be able to make the most of this year’s seasonal surge. In Europe, the biggest shopping days typically fall between 7-11 December, often coinciding with the last date to guarantee on-time delivery of seasonal gifts. An estimated EUR 517 million was spent online in Germany on 7 December last year,...

Read more

The information security risks posed by insiders are a threat to organisations across all industry sectors and disciplines. Through access to information systems afforded by their status, insiders can cause a loss of intellectual property with damaging effects even greater than those of a large external cybersecurity breach of personally identifiable information. With studies showing that 55 per cent of all attacks come from insiders, countering insider threats is an issue that can no longer...

Read more

Organisations today are expending (and rightly so) a great deal of money, time and effort on deploying a variety of technologies to prevent security breaches. They must however, also make similar attempts in mitigating the impact of malicious attacks in the event of a security incident, which most security professionals believe to be a matter of time – if it hasn’t already happened. Due to the ubiquity and pervasiveness of email, it is most definitely...

Read more

In 2016, we are subject to near constant headlines detailing the latest big data breach or hacking scandal. Many of us probably think we have a pretty good handle on the different types of security risks that can threaten our businesses. But the reality may be a little different. The introduction of new technologies, the growth of cloud computing and changing employee working practices have all opened the door to a raft of new security...

Read more
eu

The clock is ticking. Eighteen months may sound like a long time, but to rethink and enhance an enterprise’s security measures, it is not long at all. Since the European Parliament approved the enactment of the EU General Data Protection Regulation (GDPR) on the 14th April 2016, every CSO and CISO in the UK needs to be acutely aware that failing to follow it can be a very costly mistake. Breaking the GDPR rules could...

Read more

Though a cyberattack could happen at any moment, a lot of organizations are ill-prepared and don’t have a plan set up to deal with the aftermath of such an occurrence. Even a quarter of IT professionals aren’t exactly confident in their organization’s ability to remediate when or if a security breach happens, and it appears this is mainly due to a lack of awareness about the need for a plan in the first place. Even...

Read more

Nick Shaw, vice president and general manager of Norton EMEA: Cyber criminals keep an eye on top sales as closely as shoppers do. Top trending gifts, deals and peak sales times such as Black Friday and Cyber Monday are used to craft timely phishing scams or fraudulent websites. In the past year 8% of Brits had their financial information stolen as a result of shopping online, whilst 14% have had it happen to someone they...

Read more

Cybersecurity requires a holistic organisational approach. From all corners of the organisation, a concerted effort must be maintained to establish, execute, and follow through with a plan to address cyber-risk management. Although there is no one-size-fits-all plan for organisations’ cyber-risk management needs, there are basic, core principles every organisation should adhere to in order to maintain a solid security posture in the face of persistent attacks. Below are the five most common mistakes organisations make...

Read more
Page 39 of 69 1 38 39 40 69