This Week's Gurus

By Ronald Sens, EMEA Director for A10 Networks DDoS is a constantly evolving threat. We are seeing DDoS attacks getting more sophisticated, more frequent and bigger than ever before. The systems that are most common in enterprises today cannot keep up with the constantly evolving DDoS threats because many use old technology. It is therefore important that enterprises adopt a modern defence solution that can help meet these newer requirements. Specifically, there are four different...

Read more

By Lior Samuelson, CEO, Cyren  The cloud can stop phishing in its tracks faster than appliances After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back onto the IT security manager’s radar. According to our latest survey on IT security in the UK and Ireland, phishing is now the second most pressing cybersecurity issue after...

Read more

“A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and standard bodies are collapsing. History does repeat itself. One should study the evolution of insurgencies to better grasp the nature of...

Read more

If we asked any of the IT departments that we deal on a daily basis about their current priorities, they would all unfailingly say that protecting their company against cyber attacks and data breaches is top of the list - particularly now that GDPR is finally in force.   However, despite high awareness of the risks in terms of reputational damage, regulatory penalties and commercial losses, it’s evident that a surprisingly high proportion of companies...

Read more

Cyber security is an increasingly important topic for any small business to tackle, yet it remains a mystery to many. Unpicking the complexity of this issue might seem daunting, but this brief guide will lay the groundwork. For a fuller picture, check out this article from Fidus Information Security.  ultimate cyber security guide for business. Main Security Threats to Consider There are lots of ever-evolving threats posed by cybercriminals to small businesses, but the main...

Read more

By Ronald Sens, EMEA director at A10 Networks In the evolving landscape of mobile networks, we are beginning to see new vulnerabilities open up through 3G and 4G networks, and it is more than likely that 5G will follow this same fate. Protecting only this Gi Interface is no longer enough for service provider security. Until recently, the Gi-LAN connecting the EPC (Evolved Packet Core) to the internet was considered to be the most vulnerable...

Read more

For banks, direct debit (ACH) fraud represents a bigger financial risk than card fraud. In particular, growing momentum for real-time payment schemes across the world is creating huge opportunities for fraudsters and placing increasing pressure on banks and clearing houses, who now have only seconds instead of days to identify fraudulent transactions. There are various security approaches available to banks in the fight against fraud, but tokenization has already proved successful in protecting in-store and...

Read more

By Anthony Perridge, VP International, ThreatQuotient “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of...

Read more

Greig Schofield, Technical Director at Netmetix, explores the murky world of ransomware attacks and shows how organisations can protect themselves against this growing problem. Call me a romantic but I’ve never believed that the stereotypical tall, dark stranger was limited to the world of fairytale.  For businesses in the digital age, a modern-day version is both an everyday reality and a recurring nightmare. Ransomware attacks – perpetrated by faceless, shadowy strangers – are no longer...

Read more

On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO’s and senior security experts to get their thoughts and ideas on the 2018 cyber landscape and will include advice, guidance & problems faced. We will leave...

Read more
Page 5 of 68 1 4 5 6 68