Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Have you ever longed for a film to come true, to deliver a utopia of flying cars, space exploration and the instant gratification of virtual desires? Or, has a film ever made your blood run cold as you realise just how close we are to tumbling into a machine governed abyss, or feel a flicker of unease at seeing past predictions come to pass without anyone seeming to notice?  Two weeks ago, a select group...

Read more

If you are a senior leader in an organisation, I am sure you have been asked the question – “What is your digital strategy?” You may also be getting tired of people telling you that new market entrants (especially millennials) are disrupting traditional business models and are forcing you to redefine the end to end customer experience. And here is another good one- “Have you hired a digital transformation executive yet?”  While I make light...

Read more

We are living in the age of the Internet of Things. It seems like nearly everything is connected to the Internet in some way, from our coffee pots to our cars, and more devices are getting connected all the time. And while such connectivity has its benefits, it also comes with risks, especially when IoT devices are connected to corporate networks. In fact, in the wake of the large-scale DDoS attack on internet infrastructure company...

Read more

David Galton-Fenzi, CEO of Zycko, specialists in advanced networking, and CCO of Nuvias Group (of which Zycko is part), looks towards 2017 and gives his top five networking predictions  Software Defined Networking The move to-software-defined-everything will continue in 2017, and some of the biggest disruptors in the networking market will be Software Defined Networking (SDN), Software Defined Wide Area Networks (SD-WAN), and Software Defined Datacentre (SDDC). By abstracting some of the functionality of the network...

Read more

Corporate security teams face numerous challenges. They need to adapt to an increasing number of sophisticated attacks and at the same time, abide by strict business processes and controls. This can impede rapid adoption of new security solutions or changes to existing ones, with organisations cautious of updating these systems in order to minimise risk of blocking business applications or communications. As a result, existing security solutions are often not leveraged as they could be....

Read more

Unlike legacy signature-based detection systems, today’s generation of AI-powered security technologies are rarely suited to a plug-it-in-and-watch-it-light-up evaluation strategy. They often include a mix of supervised and unsupervised machine learning, automated threat hunting, trained classifiers, and focus on reducing the number of erroneous and unactionable alerts. As a result, evaluating their detection efficacy requires carefully planned testing before making a buying decision. For products focused on detecting network-borne threats, it is always wise to account...

Read more

By 2020 it is estimated that the global internet of things (IoT) market will have grown to more than $1.7 trillion. According to a study by Gartner, by the end of this year alone the number of IoT devices on the planet will have reached more than 4 billion. It is not unreasonable to suggest that by the end of this decade, these devices will outnumber humans. Such exponential growth has facilitated two major developments....

Read more

Just last week, Google pushed a much-needed security update for its Android operating system. The update effectively fixed 15 dangerous vulnerabilities ― but left one of the most major security holes wide-open. The remaining weakness has been dubbed Dirty COW, and if not patched soon, it could allow millions of Android devices to fall victim to dangerous exploits. What Is Dirty COW? Perhaps surprising to most, the Android operating system uses a Linux kernel as...

Read more

Thousands of customer accounts on the National Lottery website may have been compromised. Camelot said it believes that "around 26,500 players' accounts were accessed", but fewer than 50 accounts have had activity take place since the hack. The National Lottery operator said it became aware of "suspicious activity" on a number of players' online National Lottery Accounts on Monday. The Guru reached out to the cyber security community to get reactions to the latest data breach. Alex...

Read more

Axway has recently partnered with industry analyst firm Ovum to conduct a global survey consisting of 450 senior IT decision makers to determine how organisations are preparing to meet the needs of today’s digital economy. The findings highlighted two key concerns for IT leaders, and DevOps pros in particular. More than half of the enterprises have failed to comply with customer-driven service level agreements (SLA), face non-compliance with data security regulations and are worried about...

Read more
Page 38 of 69 1 37 38 39 69