This Week's Gurus

Written By Matthew Robertson, Co-CEO, NetDespatch In our non-stop lives, it often seems that everyone is competing to do things as quickly as possible. Nowhere is this more apparent than in the fast-paced world of online retail. There’s an abiding assumption that, if customers want something, they want it as fast as humanly – or technologically – possible. The result is that delivery continues to be the key battleground for online retailers. From same-day, four-hour...

Read more

By: Nicola Whiting, CSO of Titania and a finalist in the Security Leader/Mentor category in the Security Serious Unsung Heroes Awards 2018 "If you are sitting in a decision room and everyone looks like you and thinks like you, you will come up with a less-than-good answer. We need all voices at the table to make the best decisions." Michelle Obama I’d agree, the benefits of diversity are far reaching (especially in terms of bottom...

Read more

By Ronald Sens, EMEA Director for A10 Networks As the number of connected devices and systems grow, so does the number of threats we have to defend against. At the 2018 US Gartner Security & Risk Management Summit held in June, many security professionals visited our stand, and we heard their concerns around the current state of the cyber security world. There were certain issues that appeared more than others and below I have summarised...

Read more

"Everything is true… everything anybody has ever thought." Philip K. Dick – Do Androids Dream of Electric Sheep It is impossible to escape from the fact that technology, and increasingly artificial intelligence (AI), has transformed everyday life. It all started with how we play our music, but Apple's Siri and Amazon's Alexa (along with other similar "virtual assistants") now have a daily interface with many of us. We are also, increasingly, now daily users of...

Read more

It’s become a fact of life that hackers might lock down your computer, blocking access to your most valuable data, and vowing to free it only if you pay up. Ransomware is nothing new, but it’s profitable, and hackers are deploying it left and right. Mitigating ransomware is actually fairly straightforward. If you have backups, if your network is segmented, really all you have to do is wipe the infected computers, and reimage them from...

Read more
Data Breach Cyber attack code

By Linus Chang, CEO, Scram Software (https://scramsoft.com/) Data breaches have quickly morphed into an alarming epidemic. This is evidenced by the fact that they have become so commonplace, they’re seen as a given now rather than as shocking news. Recent history offers countless examples of breaches that can be instructive as to what’s going wrong, but here are just a few: In June of 2017, the Republican National Committee leaked data on 198 million Americans,...

Read more

Matt Ellard, EMEA Managing Director, Tanium Consumers trust and expect businesses to keep their personal data safe. They take it for granted that organisations, especially large ones, have the resources to deliver business resilience; with the right protection and safety measures in place to stop their data from being stolen. However, government data released in 2017 showed that almost half of UK firms had been a victim of  a cyber breach or attack in the previous year....

Read more

By Amina Bashir and Mike Mimoso, Flashpoint Chatbots are becoming a useful customer interaction and support tool for businesses. These bots are powered by an artificial intelligence that allows customers to ask simple questions, pay bills, or resolve conflicts over transactions; they’re cheaper than hiring more call centre personnel, and they’re popping up everywhere. As with most other innovations, threat actors have found a use for them too. A number of recent security incidents have...

Read more
Threat Detection

The character of Mad-Eye Moody in “Harry Potter and the Goblet of Fire” preached “constant vigilance” against dark wizards, even as he was a villain in disguise. The real Mad-Eye Moody had been kidnapped and locked in a trunk for an entire year, while an imposter assumed his form and took on his role as the defence against the dark arts teacher at Hogwarts School of Witchcraft and Wizardry. Not only was he an imposter...

Read more
Smart city

By Tom Kellermann, Chief Cybersecurity Officer, Carbon Black When the Die Hard movie franchise got a reboot in 2007 the plot revolved around an attack on New York’s infrastructure, with our hero John McClane up against a gang of cybercriminals intent on gaining access to critical energy, water and transport control systems to wreak chaos and (naturally) make off with a load of cash. Fast forward less than a decade and the situation went from...

Read more
Page 3 of 68 1 2 3 4 68