Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

One of the fastest-growing threats facing banking technology is the risk posed by malware – in particular, malware that can be remotely implemented via logical attacks. A recent study by Europol and Trend Micro found that the size and frequency of logical attacks on ATMs has been increasing in recent years, with criminals becoming more sophisticated and able to take advantage of poorly protected networks and the vulnerabilities found in ATM technology. Fortunately, there are...

Read more

By David Bohannon, senior security consultant at Synopsys The city of Atlanta has become one of the latest victims of a ransomware attack. The attack is believed to be the result of the SamSam malware that has compromised various healthcare, government, and educational systems over the past several years. Is SamSam malware responsible? This malware initially targeted a remote code execution vulnerability in JBoss web servers, but it has also been known to target exposed...

Read more

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO,...

Read more

By Liv Rowley, Analyst, Flashpoint As online sales in the UK rose by 3.6% in 2017, there is an ongoing need for online retailers to enhance their customer experience and in turn sustain rapid growth. This is where recognising customer satisfaction as a key driver of retention is critical. Many online retailers have implemented generous refund or replacement policies to help improve the customer journey and generate loyalty, but unfortunately, these policies can be susceptible...

Read more

By Liv Rowley, Analyst, Flashpoint As online sales in the UK rose by 3.6% in 2017, there is an ongoing need for online retailers to enhance their customer experience and in turn sustain rapid growth. This is where recognising customer satisfaction as a key driver of retention is critical. Many online retailers have implemented generous refund or replacement policies to help improve the customer journey and generate loyalty, but unfortunately, these policies can be susceptible...

Read more

By Gabriel Lopez, Program Manager – Global Service Quality, DellEMC As trained technology professionals, we’ve become used to the idea that technology changes faster every year and the need to ‘minimise negative business disruptions’ is even more critical today, when more and more business transactions are relying on effective and efficient IT Services. Many years ago, I learned how difficult it was to be ready and able to support hardware, software and, most importantly, customers...

Read more
safe

By Rick McElroy, Security Strategist, Carbon Black Today’s “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it’s also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents an ever-expanding playground in which to develop new ways of infiltrating corporate networks and making off with the digital goods. Malware, ransomware and a rising incidence of fileless attacks all constantly chip away at the perimeter while security...

Read more

Adam Maskatiya, General Manager, Kaspersky Lab   Earlier this year, Alibaba CEO Jack Ma made headlines for proclaiming the imminent arrival of the robot CEO. He told an audience at a conference in China that we are only decades away from having robots run our companies. He backed that claim up shortly after via a television interview with CNN, predicting that, in 30 years, a robot would grace the cover of Time Magazine. As implausible...

Read more

By Roberto Mircoli, EMEA CTO for Virtustream  As enterprises continue to embark on their digital transformation journeys part of this change may involve migrating in-house applications, databases and data to the cloud.  But while all the benefits of cloud are widely understood, migrating a database or an application to the cloud is not always smooth sailing and there can be challenges to overcome when transitioning.  Here I wanted to highlight some of the steps enterprises...

Read more

Written by Eric O’Neill, National Security Strategist at Carbon Black For decades we have feared the cloud.  During my time working counterintelligence for the FBI, we feared the Internet so much that agency computers functioned solely on an isolated intranet connected via hard cables. It’s no wonder to me that that government has still not embraced the unlimited processing power cloud computing affords.  But despite the fact that utilisation of the cloud has become ubiquitous...

Read more
Page 13 of 69 1 12 13 14 69