Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

The world has changed. With more users accessing data outside the corporate firewall and from mobile devices, businesses can now allow for more flexible work environments. But this increased access has also brought an upsurge in the risk of data breaches and threats from hackers. Recent high-profile breaches have heightened overall market awareness of security, not just within the CSO community, but among CEOs and boards of directors as well. Protecting the sensitive data within...

Read more

Of all the information your colleagues shared with you yesterday, how much do you remember?  What happens to the rest?  Our brains have boundaries There is a limit to what we can take in.  Our brains cannot store, let alone process all the facts that cross our path on an average working day.  If the information is in a document or email, we can at least file it for future reference.  But, if it’s spoken...

Read more

  Not two weeks ago, LinkedIn made big data breach news when hackers claimed to have more than 100 million usernames and passwords up for sale. Fortunately, the data wasn’t new, coming from a breach that happened four years ago. What was new was the size of the list that was up for sale, nearly 20 times the size of the 6.5 million passwords that were reported to have been stolen back in June 2012. The LinkedIn breach was made...

Read more

Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing the ransomware that's available through the Dark Web. Ransomware has become very sophisticated through the use of different forms of communication, payment and browsing tools that allow criminals to remain off-grid and to carrry on their illegal activities undisturbed. Tune in and join AppRiver as we share with you their expertise,...

Read more

Biometric technologies that use a person’s fingerprints, voice, heartbeat or even gait (the way we walk) as methods of authentication have attracted a lot of attention here in the UK for some time now. These techniques are gaining traction as the primary form of authentication to protect devices, apps and data. Biometric authentication is already seeing rapid adoption within the consumer arena. For example, MasterCard and HSBC have recently announced the introduction of facial and...

Read more

In security, SIEM is sometimes hailed as a 'holistic' approach - while others look upon it as a box-ticking facet of security, there for compliance purposes rather than actually defending from and reacting to security incidents. With so much confusion over the issue, the Guru felt it was time to sit down with someone who knows the topics inside out - enter Graeme Stewart, managing director at LogPoint UK & Ireland. We were lucky enough...

Read more

SQL injection: the oldest hack in the book  By Dr. Bill Curtis, Chief Scientist, CAST The latest reports suggest the highly publicised ‘Panama Papers’ data leak was the result of a hacking technique known as SQL injection.  With 11.5 million files being leaked, the Mossack Fonseca breach exceeds even the 1.7 million files leaked by the infamous Edward Snowden.  Once more, another high profile company has fallen victim to this common technique. Mossack Fonseca’s lawyers...

Read more

7 modern security problems solved with Encrypted Traffic Management (ETM)  By Robert Arandjelovic, Director of Security Strategy at Blue Coat The growing risk of un-inspected encrypted traffic in enterprise networks has been discussed for some time now. Security leaders are beginning to realise the far reaching implications of network encryption: that it truly affects the effectiveness of the entire security infrastructure. Below are some examples of challenges plaguing security and network ops teams and how...

Read more

Blockchain – it’s either the greatest technological advance since hypertext transport protocol (http, the protocol of the world wide web) or the biggest technological hype since FDDI and ATM were touted to be the 100 mbps protocol of the future some 20 years ago. In reality, both might be true. Certainly “blockchain” is being invoked by dozens and dozens of startups looking for (and getting) funding. On the other hand, blockchain is the foundation for...

Read more

By Colin Bull, Principal Consultant Manufacturing and Product Development at SQS The Internet of Things (IoT) is just that, it is the connectivity of ordinary things.  The connectivity of the internet (IPv6), the move to the cloud and big data analytics, combined with the emergence of processing power at the edge, have all allowed products to become connected and smart. From phones, to connected watches, cars to fridges, IoT has had a disruptive impact on our...

Read more
Page 51 of 69 1 50 51 52 69