Opinions & Analysis

“I think therefore I am.” - René Descartes This isn’t just a pompous philosophical proposition of autonomy, instead it is a timely piece of advice for ensuring corporate cybersecurity. Descartes really was ahead of his time! Identity and access management (IAM) plays an important part in securing your IT infrastructure by mitigating risk from both external cyberattack, and internal threat. Any company that thinks seriously about protecting sensitive information about their employees or customers should...

Read more
SOAR vs. Security Operations: What’s Really Going On?

Written by John Czupak, CEO, ThreatQuotient There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us are equally confused about the fundamental capabilities of these technologies, and more pointedly, what problems they aim to solve. Perhaps...

Read more
Machine Learning And The Future Of Security.

By Morgan Jay, Area Vice President at Imperva. We often question what drives the success behind enormous companies like Google and Amazon. A large part of the answer is machine learning. These companies have quickly adopted machine learning, finding smarter ways to apply it and changing the dynamic of how they work. With the extra analytical muscle that machine learning affords, they’re able to drive more intelligent and innovative projects which – let’s be honest...

Read more
Zero Trust Is Shaking Up VPN Strategies.

By Yogi Chandiramani, technical director EMEA at Zscaler The zero trust model has been developed because the distinction between “external” and “internal” areas of information systems has begun to blur. Private applications stand alongside their SaaS-based brethren, while the infrastructure transitions from virtualised servers in the data centre to services and apps residing on public clouds. Users are also changing. Not only are they quite often mobile, but they are also no longer strictly human...

Read more
AI: A New Era Of Cyber Threat Intelligence.

Byline: Neil Kell, Director of Evolve Security Solutions, part of the CSI As digital footprints widen and the value of data increases, so too does the risk for organisations. The latest Cyber Security Breaches survey reported that 43 per cent of UK businesses experienced a breach in the previous 12 months. This figure rises to 65 per cent in medium to large businesses. No sector is immune from cyber attacks and the increasing level of...

Read more
The Evolving Nature Of Cloud Load Balancing.

Written by Ronald Sens, EMEA Director at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it’s undergoing significant changes. Let’s look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and DevOps today: agile, efficiency and, multi-cloud operations. Agile: The movement toward public cloud is arguably driven by an organisation’s desire...

Read more
Cyber ​​Threat Intelligence: The Key To Trust And Security For The Digital Finance World.

By Anthony Perridge, VP International, ThreatQuotient In 2017, the value per Bitcoin reached over €20,000 (£17,324) - a climax in the hype surrounding the cryptocurrency. However, confidence has been lacking for the price to remain stable. To date, online currencies are more speculation than real means of payment as concerns around security are being raised. An establishment is only possible if users believe in the value’s sustainability, and this applies to every means of payment....

Read more
Cybercriminals Continue To Target Online Gambling Platforms.

By Luke Rodeheffer, Cybercrime Intelligence Analyst, Flashpoint The size of the online gambling industry is expected to approach $75 billion by 2024, driven largely by technological advancements and favourable regulatory shifts. This projected growth presents ample opportunity to companies operating in the industry, but it comes with the drawback of attracting unwanted cybercriminal interest. The online gambling industry has often been a pioneer in developing anti-fraud and device-fingerprinting technology to prevent the abuse of its...

Read more
Protecting Intellectual Property From Insider Threat.

By Josh Lefkowitz, CEO, Flashpoint The topic of intellectual property (IP) protection is getting the much-needed attention it deserves on the global stage. Due largely to the U.S. administration’s line on trade negotiations with China, the issue of counterfeit products and international IP theft by state-sponsored actors has risen to the fore. Recent estimates suggest economic espionage in the form of IP theft by Chinese actors costs the U.S. economy up to a staggering $600...

Read more

By David Orme, Senior Vice President at IDEX Biometrics With cybercriminals becoming ever-more sophisticated, and identity fraud reaching epidemic levels in the UK, the need for strict customer identification procedures has never been greater for banks and financial institutions. Know Your Customer, or KYC as it is commonly known, is a mandatory framework currently in place to protect financial institutions from fraudulent activities, such as identity fraud and money laundering. KYC, reinforced by the fourth...

Read more
Page 1 of 38 1 2 38
Social media & sharing icons powered by UltimatelySocial