Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

cybersecurity

When it comes to our cyber activity, it seems that we are playing a never-ending game of chasing tails with cyber criminals. The more our technologies advance and adapt, so criminals are finding new and sneakier ways to break into systems and take personal and sensitive data hostage. Unsuspecting industries such as healthcare and hospitality are unwittingly becoming the biggest targets of cyber attacks, as vital information such as health records and access to hotel...

Read more

With just one year to go, businesses in the UK are looking for a practical approach to preparing for the GDPR and its more challenging aspects, in particular the ‘right to be forgotten’ (RTBF). From May 25th 2018 onwards, if a company is presented with an RTBF request, they will have 30 days in which to find that individual’s information and delete all records of it that are no longer being used for their original...

Read more

Access to data is of the highest concern for leaders of the world’s most complex businesses. The amount of data stored on any network is typically immense. Relating this data to your user’s account information in Active Directory can be tricky and time consuming, yet there are security concerns that must be addressed. In this regard, proper data security includes three components: Ensuring new employee accounts are created properly when the employee is on boarded;...

Read more

May 16th and 17th 2017 saw Eskenzi PR stage its 11th 2-day IT Security Analyst Forum, as usual, in London. The morning of the second day (which was a Wednesday) was the customary CISO (chief information security officer) roundtable. A coming together of 20 or so IT security leaders from blue chip UK enterprises and public sector organisations to share their views with the analysts and IT security vendors that sponsor the event. The timing...

Read more

‘Trust’ can be both a terrific enabler and a severe inhibitor in cloud services adoption. Keen to benefit from the cloud’s promise of flexible and scalable on-demand computing, businesses everywhere continue to migrate increasing volumes of critical data off-site and into the hands of third party cloud service providers. Each time this happens, however, they must answer the same question: what guarantees do I need before I can trust this provider to protect my data?...

Read more

Written by Anthony Perridge, Regional Director, ThreatQuotient It has often been said that complexity is the enemy of security. It is a simple statement but, nonetheless, one that holds true time and time again. The more complex your infrastructure, the more likely it is to have seams with exposed vulnerabilities. This is exactly what hackers are looking for, places where people and processes are not perfect and something is left unprotected. In my last article...

Read more

By Duncan Hughes, Systems Engineering Director, EMEA, A10 Networks Threat actors have weaponised the Internet of Things (IoT) and connected devices. They’re using unsecured IoT devices and creating botnets to launch catastrophic distributed denial of service (DDoS) attacks. This has given rise to the DDoS of Things (DoT). Fueled by headline-making malware like Mirai and Leet, these DDoS attacks have reached unprecedented levels with DDoS of Things attacks exceeded the 1 Tbps threshold. And it’s only expected to get...

Read more

By Sue Trombley, managing director of thought leadership at Iron Mountain  Businesses around the world are upgrading the way they manage their information, moving from records and information management (RIM) to information governance (IG). More operational or tactical in scope, RIM describes the activities and tasks required to organise, secure, access and ultimately destroy information. IG can be described as the strategy that guides the management of information. It includes all the metrics, structures, policies,...

Read more

The tide is shifting when it comes to replacing legacy antivirus. Five years ago, maybe 10 percent of organisations said they were ready to replace it. Today, that number is about 80 or 90 percent.  A big part of the desire to shift has to do with the evolving attack landscape – specifically the increase seen in non-malware attacks. Recent research from Carbon Black’s found confidence levels in legacy AV’s ability to prevent non-malware attacks...

Read more

Dale Lovell, Chief Digital Officer and UK Managing Director (MD) at ADYOULIKE said of London Mayor Sadiq Khan recruiting for London’s first ever Chief Digital Officer: “Ten years ago the job of Chief Digital Officer simply didn’t exist. Even as late as 2013, there were only 500 CDOs across the globe. The ‘digital’ aspect of organisations was also something that was split across multiple people.” “However, with the world increasingly adopting a ‘connected’ lifestyle, with...

Read more
Page 28 of 69 1 27 28 29 69