If we can take anything from the continuous spate of data breaches, it’s that bad actors and their techniques are more sophisticated than ever and are steamrolling over organisations’ security (or lack thereof) defences. But what’s more intriguing is that despite global increased spending on security, one age-old tactic has stood the test of time: the classic phishing scam. By James Romer, Chief Security Architect EMEA at SecureAuth.
Read MoreThe threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business...
Read MoreIT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.
Read MoreAn unfortunate truth in business is that any worker, in any organisation, can be the target of a cyberattack. By David Emm, principal security researcher, Kaspersky Lab.
Read MoreJan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric cyber security strategy can help prevent data loss, even in the event of a breach.
Read MoreOur daily news updates have become littered with data breach after data breach, each costing companies on average £1.82 million. CEOs have lost their jobs and reputations following major leaks, and CSOs wake up each morning dreading the news that personal customer data is in the hands of hackers. By Iain Chidgey VP International, Delphix.
Read More