Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

By Paul Marshall, Chief Customer Officer, at Eseye The internet has been recovering from high profile DDoS attacks on Friday that took down Dyn (the DNS provider to Reddit, Spotify, SoundCloud and a multitude of other sites). In the media, the blame for this attack has been firmly placed on IoT devices and as a supplier of connectivity to IoT and M2M devices, we are keen to share advice on how devices should be secured....

Read more

By Joe Bombagi, Director of SteelFusion, EMEA & APJ at Riverbed Technology The benefits of cloud adoption – including increased employee productivity, and reduced operational costs – are enabling businesses to become more global and interconnected. Organisations large and small are rolling out an increasing number of cloud applications, enabling employee access to sensitive data from branch offices located all over the world. However, increasing reliance on cloud technologies has also compounded businesses’ data security...

Read more

by Mike Simmonds, managing director, Axial Systems                                                                 When BYOD originally took off, security concerns drove companies to take measures to counteract the risks of allowing remote access to company data from employee devices. Many believed they had shut the door to cybercrime. In reality, data breaches have continued to soar. According to research from PwC, showcased in a recent infographic from Swivel Secure, the number of small firms experiencing a data breach jumped by 14%...

Read more

By: Chris Stoneff, VP Technical Management, Lieberman Software The last Verizon Data Breach Investigation Report stated that 63% of data breaches involved cyber criminals using weak, default or stolen passwords to access information they shouldn’t.  With this in mind, it’s good to remember that being a small business is no excuse for poor password security.  This is especially so when it comes to the administrator passwords that protect access to the most sensitive areas of a company’s...

Read more

International finance has become hugely complex. The increased velocity of trading, the development of highly sophisticated instruments and the growth of stringent regulation has been matched by the demand for far more elaborate security, surveillance and reporting. Just as the nature of the financial world has become more complicated, the activities of criminals and fraudsters have also evolved. The integrity of a financial institution’s operations is now at risk from insiders with specialised knowledge, their...

Read more

Don Bush explains how a half-hearted and incomplete EMV shift in the US is leaving the door wide open to fraudsters…. The first of October 2015 saw the highly anticipated EMV liability shift in the US. Some ten years after Western Europe, and twenty years after the technology was developed, EMV cards (i.e. payment cards with a chip to encrypt the information held on cards) were finally to become the norm in the US. The...

Read more

Over the past few years, I have had the opportunity to work with various large companies during their enterprise content management (ECM) evaluation process. The process normally begins with an RFI, progresses into an RFP and then into a bake-off between a few shortlisted vendors. Next, they conduct a pilot or a proof-of-concept (POC) and finally a full implementation. The progression is lengthy and it can take from six months to several years, so both the...

Read more

US (and some European) newspapers recently carried headlines such as this one from the New York Daily News – “Facebook, Twitter and Instagram allowed over 500 law enforcement agencies to monitor users at protests nationwide”. Like many a mainstream newspaper headlines this one is rather misleading. The social networking sites didn’t “allow” any law enforcement agencies to do anything. Rather, either through normal reading of tweetstreams and the like, or through the use of APIs...

Read more

In the fast moving world of business technology and communications, computer networks form a significant part of IT infrastructure. Hardware and software must be high performance, flexible and stable – providing an uptime of almost 100 per cent, especially in customer-facing applications. Apart from high network speed, the uninterrupted availability of applications and 24/7 access to operational or transactional data are crucial. However, a number of complex factors dominate modern IT infrastructure. These include growing...

Read more

Kasper Lindgaard, Director of Research and Security, Secunia Research at Flexera Software Ah, the Internet of Things…  IoT brings with it endless opportunities – and, quite a few security challenges.  There is one overriding message for vendors and consumers alike – no Internet-connected device is likely to be 100 percent secure.  If your device is connected to the Internet, it can likely be hacked.  The problem created by vulnerabilities is more broad-based than most people...

Read more
Page 42 of 69 1 41 42 43 69