Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

According to Nuix’s recent Black Report, 75% of organisations only perform limited remediation after a penetration test. To take the positives, it’s good that organisations are paying attention to critical vulnerabilities. However, the report also shows that 64% of penetration testers say their biggest frustration is that organisations do not fix the things they know are broken. Product and system owners face a few options when they learn about a vulnerability and the risks it...

Read more

Maybe you’ve only heard about shadow IT in passing or think it’s not very likely to impact your workplace, so it’s not important. It’ll soon be clear shadow IT is wreaking havoc in ways most people aren’t aware of, making it a worthwhile subject to discuss. Shadow IT Weakens Organizational Standards When you first started working at a new place, you were probably given a computer that was set up in certain ways and only...

Read more

As service providers fortify infrastructure for the transition to 5G and to better defend against the increasingly menacing threat landscape, you need to ensure your networks and services are not only secure today, but well into the future. And it must be done while you continue to add new services to draw new customers and grow revenue. It’s a perfect storm and presents the opportunity to break away from the competition and lead the pack....

Read more

With the recent surge in fake apps tricking consumers out of personal data, experts are warning that manufacturers and developers of mobile devices need to make security a top priority in the design process to mitigate the serious risks posed by hackers. As recently as last month, numerous consumers fell foul of a fake Netflix app that infiltrated devices via a trojan allowing hackers to secretly spy on conversations, use the camera and microphone, and...

Read more

The active base of fingerprint reader-equipped devices is set to surpass one billion in early 2017, as stated by Deloitte, highlighting the rate that end users are warming to biometrics as a means of authentication. According to cyber security specialist Secure Cloudlink, organisations should follow this growing trend and incorporate biometric technology to authenticate employees in order to mitigate the high security risks that come when using passwords. According to forecasts from Deloitte, fingerprint technology...

Read more

Ransomware is the software phenomenon that has come to define the bleakness of our age. Where previous forms of malware – viruses, remote access Trojans, spyware – were seen as alien forms that had to be kept out at all costs, ransomware seems gradually to be overturning belief that defence is even possible. Symptomatic of this is the pragmatic way many businesses roll over and accept it as a sort of ‘gotcha’, an overhead to...

Read more

Have you had one – or many – of your accounts hacked? According to a report from Pew Research Center, a vast majority of Americans have. In fact, the study also shows that people believe cyberattacks are a way of life in today’s world. This may be a surprise to some, while to others it may not. In fact, 35 percent of respondents have had a form of sensitive information compromised or stolen, while 41...

Read more

The expected growth of the global Internet of Things (IoT) market will lead to increased security risks as hackers are presented with a greater surface area to compromise. This is according to Dave Worrall, CTO at Secure Cloudlink, who argues that passwords as a means of authentication have not been updated to cope with the rise of IoT and an increasingly digital economy, therefore they must be eliminated from the IoT equation.  Recent research has...

Read more

Figures from the Global Terrorism Database (GTD) show that since 2012 there has been a rise in the number of deaths from terrorist attacks around the world. In 2015, 136 people died in the Paris attacks, 32 in Brussels and 84 on Bastille Day in Nice. How can event organisers and businesses ensure the safety of citizens, employees and tourists? What can we learn from the 2016 Rio Olympics? The recent Games is a good example of a...

Read more

ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today announced its top predictions for enterprise IT in 2017. Based on insight from customers, partners, and industry analysts and insiders, leaders at ExtraHop offer the following forecasts for IT in 2017: IT Demands Situational Awareness. "IT monitoring is no longer just about performance. Simply delivering information about what's up, what's down, and who's talking isn't enough," said Arif...

Read more
Page 17 of 42 1 16 17 18 42