This Week's Gurus

According to a recent report by PhishMe, 91% of cyber attacks begin with a phishing email. The attack method remains one of the most successful available to hackers as it exploits the inherent weakness of individual users. Since the advent of networked computers, human error has almost always been at the heart of failings in cyber security, and despite increasing attempts to improve user awareness and security training, individuals continue to fall foul. With the...

Read more

Last year saw an unprecedented uptick in the volume, size and scope of distributed denial of service (DDoS) attacks. Led mostly by the Mirai malware, this drumfire of DDoS attacks took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch mammoth DDoS attacks, the likes of which the industry had never seen. For the first time, DDoS attacks exceeded the 1 Tbps threshold. And Mirai is still making waves. In...

Read more

Digitalisation is blasting the cobwebs out from enterprises and organisations of all kinds – freeing them to innovate and take advantage of the always-on economy. But it’s also helping new disruptive players to gain an unexpectedly strong foothold in many markets. One of the key advantages these new players have is that they're basing their business models on advanced algorithms and APIs (application program interfaces) to make decisions about the services they’ll offer customers –...

Read more

In today’s world, not being able to see potential threats to applications is fatal for business where data is king. As the digital economy grows, business intelligence relies on three crucial areas: visibility, context and control. Did you ever see such a thing in your life? Today, there is no rhyme or reason why companies should not focus on implementing robust application security solutions to protect customer data. With rapidly increasing encrypted traffic, being able...

Read more

After recent data breaches, Jo Gibson, Operations Director at leading cloud-based payments bureau First Capital Cashflow, explains the security benefits of using cloud services. After a number of high profile security breaches, both in the UK and overseas, the use of cloud-based systems has recently come under the microscope. Many people are becoming increasingly concerned with the reliability of the cloud and whether or not customer’s data, in particular financial data, is in fact secure....

Read more

Year on year the information security industry is experiencing a myriad of new challenges and considerations to keep organisations safe. Over the last two years I’ve noticed a significant uptake in discussions about cyber insurance. This comes as no surprise, as risks to organisations have risen well beyond manageable levels, with a single cyber attack bringing down several major sites including Spotify and Twitter last year. The costs associated with such breaches can greatly impact...

Read more

For the past few years a regulation has been plaguing the minds of businesses everywhere - EU GDPR. Now almost 3 years later we know what the regulation will be and when it will come into effect (25th may 2018). But still many business heads are left wondering what it really means and how will it affect them and their business. Let’s take a look at GDPR and some of the myths that surround it...

Read more

Data security is a big deal. You know it, I know it, and it is hard to argue at this point in time, that unless you’re living off the grid, data security is a universal value. On an almost daily basis, data breaches and their severe, far-reaching consequences are reported in the news, leaving organisations on a multinational scale in no doubt that this is an issue of the very highest significance. Further, regulations such...

Read more

When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry. The iPhone had only just launched; Facebook was still in it’s infancy; the Internet of Things (IoT) was still a dream. The routes a hacker could use to access a system were limited, and because of this, cyber security was built around walls. One was encouraged to block attacks with firewalls and other...

Read more

The Budget Ninja When thinking of the security team, a common misconception is that it is made up of a group of ninjas who can defend the enterprise with the click of a button, before anyone has even noticed anything is wrong. In reality, the IT team works in a similar way to others in the enterprise – nothing happens if budgets and corporate strategic goals aren’t met. For example, the role of the ‘budget...

Read more
Page 30 of 67 1 29 30 31 67