Opinions & Analysis

Norway was among the latest successful targets for cybercriminals, and this recent attack involved health information. The victimized organization was Health South-East RHF, which manages hospitals in nine Norwegian counties in the southeastern part of the country. It received a notification on Jan. 8 when HelseCERT, a computer response team for the health sector, advised the company of suspicious traffic on their network. Then, IT professionals at Sykehuspartner HF, the parent company of Health South-East...

Read more

The phrase “new normal” usually offers little comfort — particularly when stolen secrets are in the mix. It’s true. Data breaches have become so commonplace that we’re nearly numb to them. But now a new report indicates, the damage might be more widespread than any of us wanted to believe. As many as 30 percent of CEOs may have had their email credentials — including passwords and the contents of their correspondence — exposed in...

Read more

Splunk Inc. , provider of the leading software platform for real-time Operational Intelligence, today announced the results of new research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security investigations and often fail to effectively protect themselves. Read the full IDC InfoBrief, “Investigation or Exasperation? The State of Security Operations,” sponsored by Splunk. Findings from a survey of 600 senior security professionals across...

Read more

These might be boom times for anyone involved in application containerisation but lurking just under the surface are a host of security issues that development teams are only now starting to get to grips with. It’s an old story for the security industry that has played out numerous times in the past: a new technology arrives on the back of big promises and for a while security gets pushed to the side in the excitement....

Read more

Paying ransom fees to regain access to data in the vague hope that criminals will release files from hostage is a known phenomenon that continues to demand regular column inches. But currently, with ransomware on the rise, no company wants to get into the habit of paying out a ransom fee to access their own services. Ransomware threats reached an all-time high in 2016, increasing by 752 per cent compared to the previous year and...

Read more

Take security seriously The end is nigh. More and more data breaches are happening each day and more information is being stolen than ever before. Attack vectors such as distributed denial of service (DDoS) and Ransomware are on the rise. The former taking out half of the Internet last October when global DNS server Dyn got hit by a huge DDoS attack. Now is not the time to bury our collective heads in the sand,...

Read more

From mobile phones to WiFi door locks and ingestible smart pills, connected devices that make up the Internet of Things are entering our offices, home, and even bodies at an astonishing rate. Such devices were once a distant figment of our imagination or something only dreamt up in a Sci-Fi film, but we’re quickly becoming dependent on them to track our exercise, unlock our homes, or diagnose our illnesses. IoT has added momentum to the...

Read more

According to Nuix’s recent Black Report, 75% of organisations only perform limited remediation after a penetration test. To take the positives, it’s good that organisations are paying attention to critical vulnerabilities. However, the report also shows that 64% of penetration testers say their biggest frustration is that organisations do not fix the things they know are broken. Product and system owners face a few options when they learn about a vulnerability and the risks it...

Read more

Maybe you’ve only heard about shadow IT in passing or think it’s not very likely to impact your workplace, so it’s not important. It’ll soon be clear shadow IT is wreaking havoc in ways most people aren’t aware of, making it a worthwhile subject to discuss. Shadow IT Weakens Organizational Standards When you first started working at a new place, you were probably given a computer that was set up in certain ways and only...

Read more

As service providers fortify infrastructure for the transition to 5G and to better defend against the increasingly menacing threat landscape, you need to ensure your networks and services are not only secure today, but well into the future. And it must be done while you continue to add new services to draw new customers and grow revenue. It’s a perfect storm and presents the opportunity to break away from the competition and lead the pack....

Read more
Page 10 of 36 1 9 10 11 36