Why breach attribution is a red herring
When a data breach occurs, the first question often asked is ‘where did it come from?’. It should be ‘how did they get in?’.
J.J. Thompson, Sophos | 25 Nov | Read more
When a data breach occurs, the first question often asked is ‘where did it come from?’. It should be ‘how did they get in?’.
J.J. Thompson, Sophos | 25 Nov | Read more
A close analysis of the cybersecurity attacks of the past shows that, in most cases, the head of the cyber kill chain is formed by some kind of privilege abuse.
Shwetha Sankari, ManageEngine | 25 Nov | Read more
In recent years, Slack has transformed from a relatively unknown cloud application into one of the world’s most popular team collaboration solutions in the world.
Anurag Kahol, Bitglass | 25 Nov | Read more
The cloud environment is complex. Failure to comply with cloud regulation can simply mean the end of a business and the breakdown of your professional reputation.
Tony Stratton, APAC Sales Director, iland | 25 Nov | Read more
There are two ugly truths of cybersecurity. The first is that it takes a lot longer for cybersecurity professionals to discover the presence of malware than anyone cares to admit.
Andrew Huntley, Barracuda | 25 Nov | Read more
Zero trust is a regular topic of conversation for most CSOs today.
Darran Rolls | 18 Nov | Read more
The good news about the next era of digital transformation is how companies are becoming intelligent enterprises.
Susan Galer, SAP | 18 Nov | Read more
Cybersecurity is a daily concern in our personal and professional lives.
Sam Bocetta | 12 Nov | Read more
The productivity benefits of enabling cloud and mobile, along with the expectations of today’s modern employees, means that the majority of organisations now offer a BYOD and remote working policy.
Anurag Kahol, Bitglass | 12 Nov | Read more
The rapid growth of enterprise mobility and a growing reliance on bring your own device (BYOD) means that most enterprises have to deal with the challenge of securing corporate data in the cloud.
David Shephard | 12 Nov | Read more
As ever, phishing remains one of the most lucrative income paths for hackers, enabling them to install profit-making ransomware and similar malware to rip off victims.
Yoram Salinger | 12 Nov | Read more
In SMB’s it is more likely that an unauthorised person would be called out for being somewhere they are not authorised because everyone would know each other and would be aware in most cases that a new person is starting.
Craig Ford | 12 Nov | Read more
Data is like DNA. It’s billions of pieces of information that make us who we are; telling the world what we look like, what we enjoy and what we want.
Matt Oostveen | 11 Nov | Read more
It's hard not to get worn down on the constant bombardment of new cyber breach after cyber breach.
Craig Ford | 11 Nov | Read more
Artificial intelligence and machine learning are important weapons in the cybersecurity arsenal but they’re not yet a complete solution – or a substitute for human smarts.
Despite global awareness of the need to improve security practices, organisations remain reluctant to make the changes to their IT environments that would help them to respond more effectively to today’s threats.
David Shephard | 05 Nov | Read more
Humans are the most successful predators to have ever existed.
Campbell Murray, BlackBerry | 30 Oct | Read more
Cybersecurity is at a crossroad and if CSOs/CISOs don’t step back and reflect on how we got here, we all risk choosing the wrong path.
Nick Lennon, Mimecast Australia | 28 Oct | Read more
In today's cloud-first world, more and more enterprises are utilising infrastructure as a service (IaaS) to enhance their operations. IaaS offerings like AWS, GCP and Azure allow enterprises to focus on business growth, gain flexibility and scalability, and to achieve significant cost savings.
Anurag Kahol, Bitglass | 25 Oct | Read more
As we move further and further into the digital age, businesses are continually enhancing their ability to communicate on the move, exchange information and streamline processes through incredible advances in technology.
Matt Bunker | 25 Oct | Read more