Opinions & Analysis

Threat-Actor Opportunism At Peak During Holiday Season.

Mike Mimoso, Editorial Director, Flashpoint Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, businesses must be aware of the potential for increases in malware attacks against point-of-sale (PoS) systems, the possibility of distributed denial-of-service (DDoS) attacks against popular web-based services, and attempts to bypass fraud-detection systems, to name just a few seasonal risks. All of these are heightened by a month-long increase in online shopping and...

Read more
flashpoint logo

By Mike Mimoso, Flashpoint Modern chat services are finding their place alongside illicit forums in the cybercrime ecosystem as a place where buyers and sellers can finalise transactions or conduct real-time negotiations. The immediacy of a modern chat service—bolstered in some cases by encryption and other built-in security mechanisms—is an attractive lure for criminals leery of a law enforcement or researcher presence on forums. Cybercriminal adoption of modern chat services has been a gradual process...

Read more
Kubernetes How You Want It: How Enhancements To Red Hat OpenShift Dedicated Can Lower Barriers To Container Adoption In The Public Cloud.

By Sathish Balakrishnan There’s no shortage of data pointing to the growth of Linux container and cloud-native applications. According to a recent survey from the Cloud Native Computing Foundation (CNCF), many of the Kubernetes deployments underpinning these workloads are taking place in public clouds. While Red Hat OpenShift Container Platform provides the industry’s most comprehensive enterprise Kubernetes platform for on-premise and hybrid cloud containerized workloads, we also enable organizations to consume OpenShift-as-a-service with Red Hat...

Read more
You Think Your Business Is Primed To Deal With Any Cyber Threat – But What If It’s An Inside Job?

Seven top tips on how to prevent and cope with an insider threat By Tom Huckle, Lead Cyber Security Consultant, Crucial Academy An inside job brings up images of bank raids and heists but in the modern world companies should be thinking just as seriously about the cyber threat coming from within their own business. The possibility that a breach or a cyber attack could be down to an employee or former employee is growing...

Read more
Building Customer Trust – Cybersecurity In CSR Programmes.

Written by Jake Olcott, VP of Communications and Strategic Partnerships, BitSight In today’s evolving cyber risk landscape, Boards of Directors are becoming increasingly concerned about their company’s security performance. In fact, the NACD has found that 89% of public companies and 72% of private companies regularly discuss security at Board meetings. That’s because directors have become overwhelmingly aware not only that there has been a continual stream of data breaches in the last couple of...

Read more
David Warburton

Businesses in EMEA are urged to remain vigilant as phishing attacks ramp up during the winter months. F5 Labs, in collaboration with Webroot, has launched its second annual Phishing and Fraud report1, highlighting an anticipated threat surge from October until January. “We’re in the middle of a cyber-crimewave where phishers and fraudsters take advantage of people at their most distracted,” said David Warburton, Senior EMEA Threat Research Evangelist, F5 Networks. “It is prime season for...

Read more
All I Want For Christmas: A CISO’s Wishlist.

As Christmas fast approaches, CISOs and cyber security experts around the world are busy putting plans in place for 2019 and reflecting on what could have been done differently this year. The high-profile data breaches have been no secret - from British Airways to Dixons Carphone to Ticketmaster - and the introduction of GDPR in May 2018 sent many IT professionals into a frenzy to ensure practices and procedures were in place to become compliant...

Read more
Cybersecurity In Europe Is Improving: Thank You GDPR?

By Jake Olcott, VP of Strategic Partnerships at BitSight After years of debate over whether to impose new cybersecurity regulations on companies, General Data Protection Regulation (GDPR) laws went into effect in May 2018. Already we’ve seen several data breach victims ordered to pay fines under the new rules and cookie disclosure notices are popping up on more websites than ever. Everyone is waiting with bated breath for the first report from the Information Commissioner’s...

Read more
A10 logo

Written by Anthony Webb, Vice-President EMEA, A10 Networks Observing the evolution of global networks over the course of my career has always been fascinating. Our fast-paced, innovative industry has transformed the world, ushering in the age of mass communication that touches every part of our lives. Most people don’t give a second thought to how we keep networks in operation and evolve them to meet new demands, and that’s exactly how it should be. But...

Read more

By Matt Middleton-Leal, EMEA General Manager at Netwrix As there is no such thing as 100 percent secure and as data breaches continue to hit the headlines, investments in IT security never seem to be quite enough. When it comes to budgeting, the role of a Chief Information Security Officer (CISO) is to prioritise available resources based on the IT risks the organisation faces and justify additional investments when and where needed to executives. Of...

Read more
Page 5 of 36 1 4 5 6 36