Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

Dear editor, The latest hack to create a storm with the media and analysts alike is that of a large bank in the United Arab Emirates, reported to be Invest Bank. With large amounts of data, including tens of thousands of customer files, now in the public domain, it’s easy to see how the hack of this bank is a wake up call for all organisations, including financial institutions, to put serious security measures in...

Read more

Cyber threats and Hacking Trends for 2016 By Mike Hickson, Director, LSA Systems This year has seen many unprecedented cyber-attacks. Events such as the recent TalkTalk and Ashley Madison data breach have shocked many online companies and data driven companies. We have seen the sophistication and scale of attacks evolving throughout this year with no sign of stopping or slowing down. Staying ahead of the curve with regards to the latest advancements in ransomware, attacking trends...

Read more

Humans - the weakest link or your greatest asset? Webinar with Jeffrey Rogers, PhishMe 91% of breaches can be traced back to a phishing message that deceives a user into unleashing the attacker's payload. Having infiltrated the network, it then takes an average 205 days for the threat group's presence to be detected. For organisations to stand a chance of protecting their data assets, they need to get better at preventing threat actors from accessing...

Read more

The new ‘Triple As’ and how to be ‘every-ready’ for security breaches By Ramsés Gallego, Security Strategist & Evangelist at Dell Software Organisations are spending more than ever on IT security, both to comply with internal and regulatory requirements, comply with credit rating and to protect their data from cyber-threats, according to Dell’s Threat Report. Triple-A ratings are normally associated with Chief Financial Officers (CFOs), whereby they’re required to keep tab on John Moody’s bond credit rating....

Read more

Intel® Security today released its McAfee Labs Threats Predictions Report, which predicts key developments on the cyber threat landscape in 2016, and provides unique insights into the expected nature of that landscape through 2020, as well as the IT security industry’s likely response. Reflecting the informed opinions of 33 of Intel Security’s thought leaders, the report examines current trends in cybercrime and makes predictions about what the future may hold for organisations working to keep...

Read more

By Dave Larson, Chief Technical Officer of Corero Network Security The World Wide Web is only 25 years old, but it has overseen countless advances in the way it is written and manipulated. Look at DDoS attacks – once simple volumetric attacks have now become deceptive and capable of carrying out several functions at once. Yet responses to this threat have not enjoyed the same rapid developments. This article examines what ISPs and carriers can...

Read more

Antivirus Performance Study Shows Diversification is Key OPSWAT has two multi-scanning products, Metascan® and Metascan Online, that both demonstrate the importance of using more than one antivirus engine to detect threats - the more you have, the greater the range of protection. A single anti-malware engine cannot guarantee 100% detection of threats. However, what one engine doesn’t detect, may be detected by another engine. In this way, one engine's weaknesses can be another engine's strength....

Read more

If you see Marty McFly, can you tell him… By Martyn Ruks - Technical Director of  MWR InfoSecurity It’s finally here - the day that Marty McFly and Doc Brown will arrive in their time travelling DeLorean. Wearable technology, multi-channel television and the odd 1980’s Apple Macintosh in an antique shop will all come as no surprise. They might be a little disappointed, however, to discover that the future they have arrived in doesn’t possess all...

Read more

Real-money gaming apps – are brands gambling with more than they thought? By Ben Harknett, VP EMEA, RiskIQ The mobile gambling industry is booming and so are the cybersecurity risks its consumers face. The annual expenditure on mobile gambling is expected to reach $62 billion globally by 2018 and with people now spending more time using mobile apps than browsers it’s become the most popular platform for real-money gaming.  Yet alongside this growing consumer base...

Read more

Information managers lose a decade to track down papers for public release Phil Greenwood, Director at Iron Mountain The timeframe for releasing archived records into the public domain has changed from 30 years to 20.  To most people, changing a requirement from a very long time to a long time doesn’t sound that dramatic. But for the organisations charged with meeting that commitment, it’s a big step. Now a study reveals that one in three...

Read more
Page 22 of 42 1 21 22 23 42