Opinions & Analysis

Zero Trust Is Shaking Up VPN Strategies.

By Yogi Chandiramani, technical director EMEA at Zscaler The zero trust model has been developed because the distinction between “external” and “internal” areas of information systems has begun to blur. Private applications stand alongside their SaaS-based brethren, while the infrastructure transitions from virtualised servers in the data centre to services and apps residing on public clouds. Users are also changing. Not only are they quite often mobile, but they are also no longer strictly human...

Read more
AI: A New Era Of Cyber Threat Intelligence.

Byline: Neil Kell, Director of Evolve Security Solutions, part of the CSI As digital footprints widen and the value of data increases, so too does the risk for organisations. The latest Cyber Security Breaches survey reported that 43 per cent of UK businesses experienced a breach in the previous 12 months. This figure rises to 65 per cent in medium to large businesses. No sector is immune from cyber attacks and the increasing level of...

Read more
The Evolving Nature Of Cloud Load Balancing.

Written by Ronald Sens, EMEA Director at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and DevOps today: agile, efficiency and, multi-cloud operations. Agile: The movement toward public cloud is arguably driven by an organisation’s desire...

Read more
Cyber ​​Threat Intelligence: The Key To Trust And Security For The Digital Finance World.

By Anthony Perridge, VP International, ThreatQuotient In 2017, the value per Bitcoin reached over €20,000 (£17,324) - a climax in the hype surrounding the cryptocurrency. However, confidence has been lacking for the price to remain stable. To date, online currencies are more speculation than real means of payment as concerns around security are being raised. An establishment is only possible if users believe in the value’s sustainability, and this applies to every means of payment....

Read more
Cybercriminals Continue To Target Online Gambling Platforms.

By Luke Rodeheffer, Cybercrime Intelligence Analyst, Flashpoint The size of the online gambling industry is expected to approach $75 billion by 2024, driven largely by technological advancements and favourable regulatory shifts. This projected growth presents ample opportunity to companies operating in the industry, but it comes with the drawback of attracting unwanted cybercriminal interest. The online gambling industry has often been a pioneer in developing anti-fraud and device-fingerprinting technology to prevent the abuse of its...

Read more
Protecting Intellectual Property From Insider Threat.

By Josh Lefkowitz, CEO, Flashpoint The topic of intellectual property (IP) protection is getting the much-needed attention it deserves on the global stage. Due largely to the U.S. administration’s line on trade negotiations with China, the issue of counterfeit products and international IP theft by state-sponsored actors has risen to the fore. Recent estimates suggest economic espionage in the form of IP theft by Chinese actors costs the U.S. economy up to a staggering $600...

Read more

By David Orme, Senior Vice President at IDEX Biometrics With cybercriminals becoming ever-more sophisticated, and identity fraud reaching epidemic levels in the UK, the need for strict customer identification procedures has never been greater for banks and financial institutions. Know Your Customer, or KYC as it is commonly known, is a mandatory framework currently in place to protect financial institutions from fraudulent activities, such as identity fraud and money laundering. KYC, reinforced by the fourth...

Read more
Cybercrime & The Bottom Line: 5 Reasons Why SMEs Can’t Ignore Cyber Security.

The digital world offers many opportunities for business growth however it exposes organisations to new cyber risks. Weak cyber security can leave organisations exposed and the revenue repercussions can be severe. Joe Collinwood, CEO at CySure identifies the risks and how to mitigate them. The benefits of operating in the digital world presents many opportunities to small and medium enterprises (SMEs) however it opens organisations to a host of cyber risks. Although cybercrime is the...

Read more
Understanding Modern Cybersecurity Anatomy.

By Dr Darren Williams, CEO and Founder Of Cyber-Security Firm, BlackFog Antivirus software was born over 30 years ago when computers were still relatively new. At that time, antivirus software was king as it defended against one of the only existing threats – viruses. However, 30 years on much has changed – and in the world of technological advancements, three decades might as well be a lifetime. The threat landscape we see today is vastly...

Read more
How A Risk-Based Approach To Cybersecurity Can Save Time & Money.

Written by Jake Olcott, VP Government Affairs, BitSight If you’ve glanced at the opinion columns of security industry publications, you’ve probably seen the term “risk-based” floating around, as in “the time is now for a comprehensive, risk-based approach” or “a risk-based approach to security is key to business alignment." However, many of these articles fail to define what exactly a risk-based approach to cybersecurity is. And that’s a problem — without a solid understanding of...

Read more
Page 1 of 38 1 2 38