Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Phil Greenwood, Country Managing Director and Commercial Director at Iron Mountain  Local authorities face the challenging task of managing ever-growing volumes of records, covering anything from council taxes to confidential information about local schools. Furthermore, they must manage this data securely while dealing with the pressures of cutting costs and improving the overall efficiency of the services they provide to the public. If the protection of this information is not prioritised and is somehow compromised, severe...

Read more

After a year that has seen an unprecedented number of organisations hit by security breaches, RiskIQ looks ahead at the rapidly evolving threat landscape and shares its 2017 cyber security predictions. Some of the areas included in the predictions are: -          Threat actors finding a new way in -          IoT becomes a new threat vector but not in the way you think -          Threat actors moving ever faster, seconds count 2017 #Infosec Predictions List With...

Read more

As one of the hottest topics of 2016, businesses and consumers alike have been affected by the almost daily threats of data breaches and the impact these have on an continuous basis.   Will such threats enable identity fraud, send a business under or even give adversaries further power to conduct ever more dangerous attacks?   With this in mind, Michael Sutton, CISO at Zscaler, has crafted his top five predictions for the year ahead...

Read more

By Andrey Kovalev, Information Security Expert, Yandex The web-enabled generation has become increasingly reliant on technology for everyday activities. Cloud services, social networks, web extensions, plug-ins and online games, are all growing in popularity and as such, are replacing desktop applications. This heightened use of mobile web-browsers has opened the back door to cybercriminals, who now have new channels to implement browser-based attacks, spread malware and maximise infection campaigns. Traditional “Man in the Browser Attacks”...

Read more

The Silent Attack on Information – Complete Loss of Trust The integrity of information will be one of the biggest challenges global consumers, businesses and governments face in 2017, where information from previously venerated sources is no longer trusted. Cyber attacks won’t just focus on a specific company, they’ll be attacks on society designed to eliminate trust itself. We’ve seen information used as a weapon and propaganda tool in the 2016 U.S. election cycle, but...

Read more

A string of high profile security breaches in recent months, most notably at TalkTalk and Three mobile, reflect the ever-present and ever-growing threat to the security of billions of online accounts. Breaches compromising the sensitive details of hundreds of millions of users have become a near common place event today. In an attempt to address this threat, many companies advise users to select complex, unique passwords for each account they own and recommend changing these...

Read more

Cyber security has been a huge topic of discussion throughout 2016. With plenty of high-level (and often very public) threats, attacks and hacks, it is showing no sign of a slow down over the next 12 months. With companies looking to protect their valuable data and identity, SailPoint takes a look at the year ahead and predicts what we can expect to see and hear more of terms of identity in 2017: The domino effect...

Read more

With the New Year just around the corner, Peter Bauer, CEO and co-founder at  email security company Mimecast tells the Guru what 2017 means for cybersecurity. “The Rise of Cyber Gangs - The past year has been rampant with attacks, and it’s only going to get worse. Not just in the number of attacks, but the sophistication. Attackers have been getting smarter, their data gathering techniques more sophisticated, and they’re becoming more organised. In 2017, we’ll likely see growing...

Read more

Expect encryption The case for the use of encryption by hackers to avoid detection tools and the need to detect these attacks has been well documented. Encrypted traffic is an easy hiding place for attackers and difficult for organisations to deal with. However, trying to monitor this traffic by decrypting first, performing deep-packet inspection, and then encrypting again at line-rate speeds is problematic, even with dedicated SSL decryption, especially in the long term. There are...

Read more
Hacker sinister threat

Social media, mobile computing, cloud services and the Internet of Things (IoT) have changed the way we do business. Adversaries have changed too and are no longer merely watching networks and endpoints to determine how they will attack. Instead, they have a lot of information that they can use to their advantage and are capitalising on the fact that as we take advantage of new technologies we leave behind a digital footprint – an electronic...

Read more
Page 36 of 69 1 35 36 37 69