1989 was of a year of positive milestones which would have a profound impact on the way we live and work today. The World Wide Web was invented, the Berlin Wall was torn down, and the first GPS satellite went into orbit. However, not everything about the year was a cause for celebration. Alongside these progressive developments was the creation of the world’s first computer worm. Initially crafted to test the size of the internet, the worm spread out of control, causing devastation and...
Read MoreIf we can take anything from the continuous spate of data breaches, it’s that bad actors and their techniques are more sophisticated than ever and are steamrolling over organisations’ security (or lack thereof) defences. But what’s more intriguing is that despite global increased spending on security, one age-old tactic has stood the test of time: the classic phishing scam. By James Romer, Chief Security Architect EMEA at SecureAuth.
Read MoreThe threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business...
Read MoreIT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.
Read MoreAn unfortunate truth in business is that any worker, in any organisation, can be the target of a cyberattack. By David Emm, principal security researcher, Kaspersky Lab.
Read MoreJan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric cyber security strategy can help prevent data loss, even in the event of a breach.
Read More