Guru's Picks

Dr Leila Powell, Lead Security Data Scientist, Panaseer

As a data scientist I cannot solve business problems if appropriate data is not available. However, this is the situation faced by security leaders on a daily basis – they have to make strategic decisions, which will impact their cyber security posture, without having access to the  insights they need. How can they overcome the twin challenges of a lack of visibility (not enough of the right information) and a lack of confidence (untrusted information)?...

Read more
Windows XP

It may be hard to remember today, but when Windows XP was released on Oct. 25, 2001, it was a revelation. Aimed at both consumers and businesses, it married a user-friendly interface with reliability, replacing clunky and crash-prone Windows 2000. When upgrades to the system became available in the ensuing years, many businesses and individuals decided they had sunk too much time and money into XP-compatible hardware and training to make switching worthwhile. In fact,...

Read more
Reeses_Peanut_Butter_Cup

With Halloween fast approaching, it’s a great time to discuss some of our favourite things in life: the creation of chocolate peanut butter cups and what these can teach us about phishing. Hard to imagine a time when before the “age of the cup” because there are many that never got to know the delicious glory that accompanies the unification of chocolate and peanut butter. Prior to that time, people walked around in total ignorance...

Read more
Partnership teamwork

OneLogin, an industry leading provider of Unified Access Management (UAM), has partnered with Prianto UK to facilitate the distribution of its services in the UK. This collaboration will enable Prianto and OneLogin to fulfill their joint commitment of providing a secure, seamless experience for end-users and administrators alike. This collaboration brings together a company specialising in the distribution of software and SaaS, and what Yuri Pasea, CEO of Prianto UK, calls: “one of the leading security companies...

Read more
I think therefore IAM

“I think therefore I am.” - René Descartes This isn’t just a pompous philosophical proposition of autonomy, instead it is a timely piece of advice for ensuring corporate cybersecurity. Descartes really was ahead of his time! Identity and access management (IAM) plays an important part in securing your IT infrastructure by mitigating risk from both external cyberattack, and internal threat. Any company that thinks seriously about protecting sensitive information about their employees or customers should...

Read more
The Rise of Inside Out Security Threats

At the 2019 RSA Conference, a survey of 650 IT professionals revealed that 75% feel vulnerable to insider threat. This information from industry experts proves that there is dichotomy in the perception of cyberthreat across the media and IT professionals. This marks a significant shift from the frequent headlines warning of external cyberattacks that frequently occur in news sources and proves the critical nature of internal threat. Indeed, the individuals surveyed, ranked user errors (39%)...

Read more
Lookout! Total App Defence is Here

Satendar Bhatia, the SVP of Embedded Software Sales at Lookout, announced yet another successful year for Lookout App Defence as they continue to break “into new markets, and acquired new customers globally”. Powered by the largest dataset of mobile code in existence, the Lookout Security Cloud provides an assessment of the entire spectrum of mobile risk in the post-perimeter world. Providing a software development kit, Lookout App Defence, allows apps to become self-defending by leveraging...

Read more
Page 2 of 7 1 2 3 7