Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

By Mike Banic, VP of Marketing, Vectra Networks Conventional wisdom about malware infection paints a picture that hapless users click on something they shouldn’t, that in turn takes their Web browsers to a drive-by-download website. It then exploits a vulnerability to install a botnet agent that eventually steals all their personal data and uploads it to cybercriminals in another country. That conventional wisdom isn’t completely wrong, but it needs some serious updating. Today’s malware infections...

Read more

The list of critical data stored by government agencies is endless. From credit card data, passport numbers, drivers’ license numbers and tax information, government agencies are storing vast amounts of data that create the perfect treasure trove for hackers to exploit. What’s more, with strict regulations being enforced to ensure that organisations not only keep their data secure but that they become more transparent about data breaches when they do occur, such as the EU...

Read more

Multiple SIEM Dilemma - UDP Forwarding By Mike Patterson, Founder and CEO, Plixer In large enterprise environments, the security teams are often completely autonomous from the network team.  They purchase separate tools to do their jobs and they keep the data separate as well.  This results in an unwillingness to share resources such as access to the SIEM for running searches. The separation of responsibilities can also result in double purchases of exactly the same solution...

Read more

As the biggest sporting event of the summer begins, IT and security leaders need to make sure they refocus their cyber security efforts, to assess the risks associated, and their ability to respond if needed. Vigilance should be at the forefront for business leaders globally. Cybercriminals are aware that users will be looking for convenient ways to keep up-to-date with the sporting action. This is forcing organisations to roll out revised policies that ensure the...

Read more

Join the experts from AppRiver as they run thourgh some of the details of the MySpace and LinkedIn breaches of late, which saw millions of account details compromised. Also worth considering is how these braches can impact peoples' lives, given what we've seen in the past with some large-scale breaches. With compromised details, consumers become highly susceptible to fraud and other kinds of crime - luckily AppRiver are able to offer some advice on what...

Read more

Network-based malware detection addresses increasing complexity of malware ecosystem but doesn’t make attribution a key priority. Conventional wisdom about malware infection paints a picture that hapless users click on something they shouldn’t, that in turn takes their Web browsers to a drive-by-download website. It then exploits a vulnerability to install a botnet agent that eventually steals all their personal data and uploads it to cybercriminals in another country. That conventional wisdom isn’t completely wrong, but...

Read more

As more and more businesses choose to communicate with their customers via mobile, security threats aimed at mobile users are becoming more widespread. Invoices, statements and payslips are all frequently opened on mobile devices, with responsibility for security shared between the sender and the recipient. But security attacks are becoming increasingly sophisticated, with hackers now targeting mobile payment systems as well as browsers. According to a 2015 survey from PWC, 15 per cent of organisations...

Read more

Over 40 years ago, my father broke the lock on the front door of our house. He never fixed or replaced it, so the front door was never locked – even if we all left on a week-long trip. At the same time, he religiously locked the backdoor every night. His theory was, I believe, that the back door could only be seen from one window of one neighboring house while the front door was...

Read more

Modernise authentication methods or suffer the consequences By Richard Lack, Director of Sales EMEA at Gigya   The way digital enterprises connect with their customers is changing. Consumers are demanding more trusted and personalised experiences in exchange for their personally-identifiable information (PII), while businesses are struggling to protect user privacy in light of growing global security and privacy concerns. Traditional authentication solutions and methods were simply not built to bridge this widening gap. As consumer...

Read more

The clock is ticking for UK businesses still not prepared for the EU General Data Regulation By Lewis Henderson, Director, Client Engagement at Glasswall Solutions Across the globe, an alarming number of widely-known businesses are falling victim to data breaches. Public concern over the safety of private data is becoming increasingly prevalent, due to the large amount of media coverage surrounding prolific scandals like last year’s incident at TalkTalk. Those concerned about these events are...

Read more
Page 47 of 69 1 46 47 48 69