Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Few would say that 2017 was an uneventful year in the realm of global geopolitics, and this year is already shaping up to be fraught with similar volatility. As such, organisations seeking to proactively combat relevant threats and address enterprise-wide risk must regard geopolitical context as a core component of their intelligence programmes. This is why Flashpoint is pleased to introduce the third edition of its biannual Business Risk Intelligence (BRI) Decision Report. By providing...

Read more

Getting cyber security right should be a priority for all modern businesses, especially after a 2017 study by Oxford Economics found that cyber security breaches in the UK cost businesses investors £42bn. Jonathan Swan, operations and IT director at Roythornes Solicitors, questions what can be done to ensure your customers’ data is protected. There has been a fear about customer data protection within the legal sector for quite some time now, after several high-profile cases...

Read more

Albert Einstein once said, “Look deep into nature, and then you will understand everything better.” Obviously, he wasn’t thinking of cybersecurity at the time, but he could have been. Consider for a moment how each species has developed a method of defence based on a single criterion – the capability of its main predator. Some animals bet on speed, while others bet on protective shells, or camouflage, or an ability to climb, etc. The variations...

Read more

Just imagine that a DDoS attack is crushing your network. Your enterprise’s internet pipe is under siege and almost to capacity. There is nowhere else for the traffic to go, making it impossible for legitimate user traffic to get through. So, what is the result? The attack is successful, your network or services fall down, you lose productivity and revenue, your brand is irrefutably damaged and all you can do is pick up the pieces....

Read more

2017 was a testing year for us all. Organisations were scrambling to ensure their data practices were in line with approaching compliance deadlines like PSD2 (January the 16th) and the General Data Protection Regulation (GDPR) (25th May). Whilst high profile data breaches seemed to hit our headlines on a weekly basis.   At the same time, the maturing of DevOps puts even more demand onto data, and as enterprises have started to consider using the...

Read more

Cyber-attacks and privacy threats are now a high-profile concern across all sectors. With 2018 just around the corner and The General Data Protection Regulation (GDPR) coming into effect on 25 May, 2018. Small and middle-sized businesses (SMBs) need to be prepared for this new regulation. In order for SMBs to comply with GDPR its decision makers and key people in the organisation need to be aware that the law is changing. Also, they need to...

Read more

The cybersecurity industry tends to focus its attention on what to do after a breach or a hack occurs. After all, this is the topic of discussion for the media, or an organisations’ partners and customers. “What does the victim do now?” But shouldn’t we at least be as interested, if not more so, in what the organisation should be doing before a breach ever occurs? This is how we’ve come up with the term,...

Read more

There’s a flood of connected devices making their way into our homes and businesses – a deluge exacerbated by recent holiday gifts and the latest and greatest from CES, where connected devices always take top billing.   From mobile, wearables and car technology to advancements in smart homes, TVs and cameras, the tech world is awash with internet-connected devices. By 2020, it’s estimated that there will be more than 30 billion connected devices in the world...

Read more

"As Greek philosopher Heraclitus said, “the only one constant in life is change.” There is perhaps no better example of this than the technology industry, where innovation is so rapid that even the most fantastic of imagined futures seem like they could become a reality in the not too distant future. As we enter 2018, Axis has put together five top technology trends that it feels will have a great impact on the security and...

Read more

Using CTI to support a back to basics approach   Cyber Threat Intelligence (CTI) can be defined in many different ways and it can simply be a threat feed. In the coming year, it will be important to use threat intelligence to provide an early warning system to customers and context to threats. In short, by doing the hard work, so customers don’t have to be dependent on the service and level of access, suppliers...

Read more
Page 18 of 69 1 17 18 19 69