Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Csaba Krasznay, Product Manager of Shell Control Box, Balabit (www.balabit.com) Hackers may have many challenges, but it seems gaining access to a corporate network using social engineering techniques is not one of them. Social engineering – a technique whereby an individual is tricked into revealing personal or log-in information – is nothing new, but its evolution in recent years is shocking. Recently, the biggest and costliest data breaches (such as OPM or Ashley Madison) were...

Read more

Top five tips for protecting customer documents The steady digitisation of customer service and engagement processes has brought about significant improvements in both efficiency and customer experience. Being able to customise operational and marketing communications down to the most personal level means that correspondence between a business and its customers should always be treated as private and confidential. But moving customer documents from paper to digital introduces security challenges around electronically storing, processing and sharing customer...

Read more

Protecting a business from natural disasters and unwanted trespassers will probably come as second nature. But in the age of a digital revolution, protecting data from cyber intrusion, human error and data loss need to be top of the agenda for all businesses. The backup plan Gartner predicts there will be 6.8 billion connected devices in use this year, jumping to 20 billion connected devices in 2020. As reliance on digital devices grows, businesses need to...

Read more

What does the death of Mozilla Persona mean for identity management  By V. Balasubramanian, Product Manager, ManageEngine Identity management will likely be dominated by a hybrid of password management and unified authentication in the future. When Mozilla first launched its identity management system, Persona also known as BrowserID, five years ago, the technology seemed to be on its way to becoming a standard. It promised to eliminate the need for users to remember a separate...

Read more

The Guru sat down with Nuix VP of Business Threat Intelligence and Analysis Joe Hoofnagle and asked him about a range of topics - from compliance to data analysis, see below for how companies are adapting and what the latest in analytics and security can help us accomplish today. Guru: How can data analysis be applied to combat insider threats? JH: It’s often thought (and preached in the industry) that organisations need to comb through...

Read more

Is Cloud Security the Next Hot Career Path?  Named by Gartner among the top technology trends for six consecutive years starting in 2009, cloud computing continues to experience major growth. Seen by companies of all sizes as a scalable, cost-saving strategy, the cloud is changing how both enterprises and small/medium companies do business. Momentum has been growing every year. Software-as-a-Service, which had 13 percent adoption in 2011, quintupled in 2014 to 74 percent adoption, with...

Read more

Ambitious hackers open national infrastructure floodgate  by Lewis Henderson, VP of Product at Glasswall Solutions Governments around the world received the wakeup call they desperately needed last December, when a power outage occurred across western Ukraine. While it may not have been catastrophic – though the hundreds of thousands of homes left without power, during winter no less, may disagree – its pertinence lies in its cause. The mass blackout was the first of its...

Read more

Will your home-workers be the cause of your company’s next data breach? Phil Greenwood, Director at Iron Mountain Every day, across the UK around 1.5 million professionals work from home; more productive, happier in their role and measurably less stressed, perhaps. At the same time, however, they may be increasing the risk to your sensitive business data. Since the Government has recently given all employees the right to request flexible working, the number of home-workers,...

Read more

 Why the IP Bill Threatens the UK Tech Industry By Brian Spector, CEO, MIRACL Last week was a turning point in the history of UK government surveillance. If it proceeds into statute, the Snooper’s Charter could have huge ramifications for our collective privacy. It has the potential to undermine trust in the Internet as a whole, from service providers, to device manufacturers, to the apps we use as part of our everyday lives. But it...

Read more

Access All Areas? -- Stuart Facey, VP EMEA at Bomgar discusses how the control and management of network access can combat data breaches Last week, media regulator Ofcom confirmed that a major data breach had occurred within its organisation.  Before leaving the company a former employee had downloaded as much as six years of data provided by TV broadcasters to the regulator.  The data was reportedly offered to the ex-staffer’s new employer, with the intention...

Read more
Page 53 of 69 1 52 53 54 69