This Week's Gurus

For banks, direct debit (ACH) fraud represents a bigger financial risk than card fraud. In particular, growing momentum for real-time payment schemes across the world is creating huge opportunities for fraudsters and placing increasing pressure on banks and clearing houses, who now have only seconds instead of days to identify fraudulent transactions. There are various security approaches available to banks in the fight against fraud, but tokenization has already proved successful in protecting in-store and...

Read more

By Anthony Perridge, VP International, ThreatQuotient “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of...

Read more

Greig Schofield, Technical Director at Netmetix, explores the murky world of ransomware attacks and shows how organisations can protect themselves against this growing problem. Call me a romantic but I’ve never believed that the stereotypical tall, dark stranger was limited to the world of fairytale.  For businesses in the digital age, a modern-day version is both an everyday reality and a recurring nightmare. Ransomware attacks – perpetrated by faceless, shadowy strangers – are no longer...

Read more

On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO’s and senior security experts to get their thoughts and ideas on the 2018 cyber landscape and will include advice, guidance & problems faced. We will leave...

Read more

For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined to ensure there weren’t any glaring issues or major red flags—but due to limited time resources, or the ability to parse out qualitative responses during M&A from real performance, there wasn’t a great deal of importance placed on it.  Very few transactions would be prevented due to cyber security practices today, however each M&A does...

Read more

On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO’s and senior security experts to get their thoughts and ideas on the 2018 cyber landscape and will include advice, guidance & problems faced. We will leave...

Read more

By Tim Brown, VP security at SolarWinds MSP Every year, the entire month of October is given over to Cybersecurity Awareness—a campaign dedicated to promoting information security and safer use of the internet by everyone. But is it having an effect? Are UK businesses more aware of—and better prepared for—the cyberthreats they face? The answer is yes… and no. Businesses are increasingly aware of cybersecurity, with research from the Ponemon Institute showing a clear majority...

Read more

Despite the inevitability of a cloud-based computing future, organisations are still hesitant to abandon their existing on-premises infrastructures, whether it be for security and/or compliance issues or due to workloads that don’t lend themselves well to virtualised platforms. Thankfully there is a middle ground. A colocation to cloud strategy is about enabling companies to locate servers in third-party datacentres where they can realise the benefits of lower costs and improved security. More importantly, they can...

Read more

Data scientists and information security practitioners have long operated in their own independent spheres of influence. When you look at their responsibilities, however, you begin to see they are more alike than different. A data scientist is someone who analyzes and interprets complex data to assist a business in its decision making, which is similar to an InfoSec practitioner who uses data to detect threats to an organization. Both take business data generated within the...

Read more

By Lewis Henderson, VP of Product, Glasswall Solutions The success of the Rubella Macro Builder toolkit has demonstrated that the cyber-crime-as-a-service is in rude health right across Europe. A report from Flashpoint reveals that the toolkit has been used to create malicious macros in Microsoft Office documents sent as email attachments in massive criminal spam campaigns. Rubella Macro Builder is fast, on sale at a lowered price of just $40 per month, and is in...

Read more
Page 5 of 67 1 4 5 6 67