Opinions & Analysis

Looking To The State Of Cybersecurity For The Year Ahead.

By Tim Brown, VP of Security, SolarWinds MSP 2018 was a prolific year within the cybersecurity and wider tech landscape. Data breaches have consistently made headlines, and as a result, we have seen the public mood sour toward many well-known companies whose brands have been quite damaged—potentially irreversibly. The rate of high-profile cyber-attacks and data breaches shows no signs of slowing down either—especially as the value of customer data continues to grow. While 2019 may...

Read more
These Are Not Cybersecurity Predictions For 2019.

Written by Jonathan Couch, SVP Strategy, ThreatQuotient As 2019 approaches, cybersecurity professionals are beginning to share their predictions for the coming year. I am not a big fan of these types of predictions. That’s because what actually happens in any given year tends to be more of the same with one or two new, unique industry targets or types of attacks that have evolved. For the most part, threat actors aren't really that advanced or...

Read more
Trend Micro Finds One Third Of Cybersecurity Staff Feel Isolated From The Business.

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today revealed that IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role. IT teams are under significant pressure, with some of the challenges cited including prioritising emerging threats (47 percent) and keeping track of a fractured security environment (43 percent). The survey showed that they are feeling the weight...

Read more
PewDiePie IoT Hack – Time For Manufacturers To Take Action.

In November 2018, two teenage fans of YouTube star, PewDiePie, carried out the hack of over 100,000 printers, in a bid to promote their social media hero and to highlight the vulnerability of IoT devices. Today, the BBC shared an anonymous interview with the hackers, who reveal how and why they carried out the attack. This situation has grabbed media headlines around the world but is far from unique in the security industry. It does,...

Read more
Data Protection Day – New Year, Same Passwords?

By Sandor Palfy, Chief Technology Officer of Identity and Access Management at LogMeIn The number of data breaches we saw in 2018 – let alone those we saw in the last couple of weeks – certainly brings a somber mood to this year’s Data Protection Day. Big names, including the likes of British Airways, Cathay Pacific and Facebook made headlines last year for all the wrong reasons, and the fact that it took less than...

Read more
Why Executive-Protection Teams Need Finished Intelligence.

By Glenn Lemons, Senior Director of Customer Success, Flashpoint For executive protection teams tasked with safeguarding business leaders in an increasingly complex threat landscape, having rapid access to relevant information is essential. But as more threat actors shift operations online—and often to illicit, exclusive communities and platforms—many of the insights most useful to executive protection teams are becoming decentralised and difficult to access. These challenges highlight the need for executive protection teams to augment their...

Read more
Getting Your IT Security Budget Right.

By Alastair Hartrup, Global CEO of Network Critical Every year for many technology organisations, seeing headlines on a daily basis with reports of data breaches and cyberattacks from all corners of the globe is highlighting the need to ensure they are protected. Board rooms and executive management are more aware of the need for effective cybersecurity today than they ever have been. This awareness is driving action as many organisations look at frameworks for guidance...

Read more
2019 Network Predictions For Service Providers.

By Alastair Hartrup, Global CEO of Network Critical. With 2019 underway, I want to share my thoughts on key topics that will impact the IT industry, especially for service providers and telecoms. In 2019, network infrastructure and technology will be changing both in terms of good and bad. 5G is on the way, but not this year 5G was a hot topic last year. Many service providers across the world began running trials to test...

Read more
ExtraHop Turns Security Analysts Into Threat Experts With Reveal(x) Winter 2019.

ExtraHop, provider of enterprise cyber analytics from the inside out, today announced new capabilities designed to help Security Operations Center (SOC) and Network Operations Center (NOC) teams identify and safeguard critical assets, rapidly detect late-stage and insider threats, and transform security analysts into threat experts with streamlined investigation workflows. Demand for business agility and uptime have accelerated the rapid modernization of IT, which is now highly dynamic and distributed - from the data center, to...

Read more
Five Top Tips For Small Businesses Adopting Encryption.

Written by Bernard Parsons, CEO, Becrypt Becrypt has been in the disk encryption business for more than 15 years and have carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms. Based on the...

Read more
Page 1 of 36 1 2 36