Friday , 20 April 2018


Huawei addresses supply chain risks in new whitepaper

Today, Huawei released its 2016 cybersecurity white paper ‘The Global Cyber Security Challenge — It is time for real progress in addressing supply chain risks’ at the Information Security Forum (ISF) held in Berlin from October 22 to 25. The Huawei 2016 cybersecurity white paper reveals the continuous efforts of information and communications technology (ICT) providers across the globe in addressing ... Read More »

The C-Level Executive’s Guide to Transforming Endpoint Security

As C-level information and security executives are well aware, we now live in a world where the question is no longer “if” your network will be compromised, but “when.” Verizon and other research studies have proven that the most common and effective way for cybercriminals to target data of interest is to compromise vulnerable endpoints and use them as launch pads as part of ... Read More »

Key steps for protecting confidential corporate data in Europe

Drooms, the virtual data room provider,has released its whitepaper entitled: ‘Europe after the data protection scandal: how can confidential corporate data be protected?’. This paper focuses on the revelations around data security that have followed the recent disclosures about the NSA and its methods of gathering information.   These revelations have highlighted the need for a greater understanding of the ... Read More »

“XP Migration the Only Salvation”

Avnet Embedded, a business group of Avnet Electronics Marketing EMEA, a business region of Avnet, has announced the publication of a new opinion paper warning that the only viable option for businesses is to rapidly migrate off Windows XP, in the wake of Microsoft’s plan to withdraw support for XP in April 2014 – and giving businesses clear options as to ... Read More »

Securing our digital tomorrow

Almost £7m worth of business contracts have been won by the Centre for Secure information Technologies (CSIT) since it was founded in 2009, according to the Centre’s annual report which has just been published. CSIT is the UK Innovation and Knowledge Centre (IKC) for secure information technologies based at Queen’s University Belfast. Other highlights include industry contracts now make up ... Read More »

Applying big data analytics to human-generated data

As the analytics industry moves to address an explosion in machine-generated data, another opportunity is already here. Emails, texts, documents, and other unstructured human-generated data — and the metadata associated with them — deliver significant insight to businesses with the resources and will to mine them. Taking control of human-generated data provides companies with a more complete understanding of their intellectual property, enables them ... Read More »

Managing and Protecting Web Server Resources: A Critical Piece of The Security Puzzle and it Can Save You Money.

A server needs to be carefully managed for its resources, to ensure the highest performance and operational efficiency. Your web server is no exception to this rule. The experienced team at DOSarrest, DDoS mitigation and internet security experts, have been helping clients defend against DDoS attacks for years. They have had the opportunity to analyze hundreds of websites, and have ... Read More »

Into the Breach: A Look at Real Incidents from the Case Files

Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection. The DBIR is based on statistics collected by the US Secret Service, the Dutch National High Tech Crime Unit, and 17 other state and governmental contributors, representing incidents on a global scale. While there may be a few significant one-off breaches, over the ... Read More »

11 Things IT Should Be Doing (But Isn’t)

When it comes to protecting spreadsheets, documents, images and other data on file servers, SharePoint sites, and in Exchange mailboxes and public folders, most organizations readily admit that their current processes and risk profiles are less than ideal. Unfortunately, IT personnel – rather than the people that own the data – are the ones making many of the decisions about permissions, acceptable use, and access review. ... Read More »