This Week's Gurus

The use and adoption of IoT devices is continuing to grow at break-neck speed. In fact, IHS Markit recently predicted that the number of IoT devices will balloon to 125 billion by 2030. Clearly, the advantages of IoT devices are well-understood: they are more capable, more efficient, and more reliable than their predecessors. But as IoT devices flood the office environment, businesses are failing to understand the dangers they pose.   Connected devices can be...

Read more

Paul Rosenthal, founder and CEO of online encryption specialist, Appstractor Corporation, takes a look at the five most common myths and misconceptions held by SMB owners when it comes to online security and encryption, and why these thoughts are putting them at risk.   High profile cases in the media have made many business owners and executives aware of the threats posed by cyber criminals. But for SMBs, the threat can easily feel like something...

Read more

By Chris Ross, SVP International, Barracuda Ransomware may be a headline favourite, but the attack itself is nothing new. In fact, it’s been around in some form or another for decades. Since last year’s high profile global campaigns such as WannaCry and NotPetya you’d be hard pressed to find anyone who isn’t aware of the threat posed. But are the headlines representative? Do IT teams really feel the threat day-to-day? Is there a danger that...

Read more

Security takes priority when it comes to the development and deployment of IoT, with Gartner predicting that by 2020, IoT security will make up 20% of annual security budgets. As a potential inhibitor, analysts, vendors and stakeholders alike are concerned about the potentially significant security risks associated with IoT deployments. These concerns are playing a role in decision-making and end user confidence in deploying IoT services, particularly when it comes to utilising existing networks that are known...

Read more

By Ronald Sens, EMEA Director for A10 Networks DDoS is a constantly evolving threat. We are seeing DDoS attacks getting more sophisticated, more frequent and bigger than ever before. The systems that are most common in enterprises today cannot keep up with the constantly evolving DDoS threats because many use old technology. It is therefore important that enterprises adopt a modern defence solution that can help meet these newer requirements. Specifically, there are four different...

Read more

By Lior Samuelson, CEO, Cyren  The cloud can stop phishing in its tracks faster than appliances After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back onto the IT security manager’s radar. According to our latest survey on IT security in the UK and Ireland, phishing is now the second most pressing cybersecurity issue after...

Read more

“A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and standard bodies are collapsing. History does repeat itself. One should study the evolution of insurgencies to better grasp the nature of...

Read more

If we asked any of the IT departments that we deal on a daily basis about their current priorities, they would all unfailingly say that protecting their company against cyber attacks and data breaches is top of the list - particularly now that GDPR is finally in force.   However, despite high awareness of the risks in terms of reputational damage, regulatory penalties and commercial losses, it’s evident that a surprisingly high proportion of companies...

Read more

Cyber security is an increasingly important topic for any small business to tackle, yet it remains a mystery to many. Unpicking the complexity of this issue might seem daunting, but this brief guide will lay the groundwork. For a fuller picture, check out this article from Fidus Information Security.  ultimate cyber security guide for business. Main Security Threats to Consider There are lots of ever-evolving threats posed by cybercriminals to small businesses, but the main...

Read more

By Ronald Sens, EMEA director at A10 Networks In the evolving landscape of mobile networks, we are beginning to see new vulnerabilities open up through 3G and 4G networks, and it is more than likely that 5G will follow this same fate. Protecting only this Gi Interface is no longer enough for service provider security. Until recently, the Gi-LAN connecting the EPC (Evolved Packet Core) to the internet was considered to be the most vulnerable...

Read more
Page 4 of 67 1 3 4 5 67