Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

How to defend your organisation when the firewall collapses By: Jonathan Sander, VP of product strategy, Lieberman Software Traditional network defenses like firewalls and anti-malware are essential in defending companies from cyber attacks.  However, they are not enough; all they do is keep out noise, preventing the low-skilled attackers that will always be out there looking for easy targets. In fact, attacks that do significant damage beyond the network perimeter – even to organisations that...

Read more

Brexit & Privacy Legislation: 6 Reasons why the GDPR is probably here to stay Peter Galdies, Development Director, DQM GRC Whilst the decision by the people of the United Kingdom to leave the European Union has implications for the legislative framework for privacy in the UK, these implications are unlikely to significantly affect the need for organisations to adopt the General Data Protection Regulation (GDPR). Reason 1 – The 2+ year negotiation phase… Formal negotiations...

Read more

With social engineering now a bigger threat to businesses than hacking, spamming or DDOS attacks, Jason Fry – Managing Director at PAV i.t. services – a company that works with clients across the UK providing technical solutions including training to prevent hacking and data security breaches – discusses how businesses can safeguard themselves from falling foul of cyberattacks With UK firms losing £18 billion in revenue from cyberattacks in 2015 alone, and 90% of major...

Read more

Security teams receive alerts on a daily basis, all of which indicate a potential incident.  Tasked with reviewing and triaging these suspected incidents, analysts are often unable to quickly validate whether an incident is real or not, not least because they receive little context from the alert and, therefore, cannot assess the potential impact.  In fact, it can often take days or even weeks to investigate, retrieve and analyse data about a threat.  As a...

Read more

How SMEs can stay off hackers’ hit lists  By Chris Dye, VP Alliances, Glasswall Solutions It’s hard to understate the importance that small to medium-sized enterprises have for the UK economy. Making up 99.3 per cent of private sector business, these companies bring a collective £1.6 trillion to the UK each year, according to the Department of Business Innovation and Skills. But just as SMEs are vital to keeping the national economy afloat, they are...

Read more

How much is your data worth to you? For victims of ransomware this is no longer a rhetorical question but painfully real.  Ransomware locks or encrypts data on a device and then demands a ransom for the key to release it.  It is a comparatively lucrative business for cybercriminals: while the majority of traditional attacks involve seizing data and then finding ways to cash that data in, with ransomware they can earn the money at...

Read more

Large sports teams and large sporting events are attractive to cyber criminals on several levels. Not only are they highly visible and present large targets of opportunity for criminals who may be looking to earn a name for themselves, teams also amass large repositories of valuable performance and health stats and analytics on players and games. Thieves and hackers are attracted to the huge publicity a large hack could potentially get, and also to the...

Read more

By John Flemming, Senior Software Developer, Echoworx Any encrypted communication is only as secure as the keys used by the system that locked them. If the keys are compromised by hackers, negligence or other means, then any communication using those keys can be decrypted. So how can these keys be protected? According to a recent Ponemon 2016 Global Encryption Trend Study, 67 per cent of IT professionals rated key management as one of the most...

Read more

By Axel Volonté, Enterprise Networks & Communications Regional Product Manager, Zebra Technologies $400 million. That’s the estimated loss from 700 million compromised records caused by data breaches, according to Verizon’s “2015 Data Breach Investigations Report.” There’s no question that data breaches are becoming a bigger threat to companies worldwide, particularly as their customers and employees rely more on technology to do their jobs – and as more and more devices are connected via the Internet...

Read more

By Craig Downing, Senior Product Marketing Director, Epicor When business-sensitive data is hacked or leaked the consequences can be disastrous for an organisation. ERP (enterprise resource planning) systems can be particularly attractive targets for hackers because to a cybercriminal they look like honeypots of valuable data. Whether that data is customer credit card details, business financial data or intellectual property, if cybercriminals obtain it they can sell it on the underground economy. Other risks include...

Read more
Page 48 of 69 1 47 48 49 69