Data
Adding a human layer to data security in government organisations
There seems to be a sense that human-activated data breaches are inevitable within the public sector, meaning risk appetite is set at a level that accepts a 25% breach risk. Tony Pepper, CEO, Egress, explains how the public sector can protect data and employees. Digital...
New CrowdStrike report reveals more cyberattacks in the first half of 2020 than 2019
Cybersecurity expert, CrowdStrike, has released its CrowdStrike Falcon OverWatch 2020 Threat Hunting Report, which reveals the company has stopped 41,000 potential intrusions in the first half of 2020, compared to the 35,000 it saw in the whole of 2019. The report found that this significant...
BMC delivers automated detection and response for mainframe security operations
BMC, a global leader in IT solutions for the Autonomous Digital Enterprise, has announced new capabilities for the BMC AMI Security solution to automatically protect, detect and respond to threats on the mainframe. BMC AMI Security shares mainframe security events with enterprise security...
Acronis acquires DeviceLock to add data leak prevention to cyber protection portfolio
Acronis, a global leader in cyber protection, has announced the acquisition of DeviceLock, a leading provider of endpoint device/port control and data leak prevention software for enterprises and government institutions around the world. As part of the agreement, DeviceLock will become a wholly...
Features
Password protection: Tips on how to secure the ‘keys to the kingdom’
Research from LastPass by LogMeIn, a leader in password management, has revealed that while businesses are making strides in...
CyberArk expert on securing the paperless health service
The increased use of electronic personal information, coupled with rapid advances in healthcare technology, has created complex...
Insights
Fortinet expert on securely accelerating cloud strategies
Alain Penel, Regional Vice President – Middle East, Fortinet, discusses how organisations can leverage the performance and...
From beach to breach: Don’t get burned by your emails this summer
It’s the summer holidays, the sun is out (mostly, or has been), and holidaymakers are taking a well-deserved break from work. But...
BeyondTrust CISO on conversation marketing security pitfalls and best practices
Organisations are increasingly recognising the value of chatbots in providing a positive customer experience. But it is important that...
Industry experts discuss how best to ensure the data centre is secure
Ensuring the data centre is secure should be a top priority for CISOs as the consequences of a breach are catastrophic. Industry experts...
Case Studies
Tesco secures distributed workforce with OneLogin MFA solution
Luke Fairless, Technology Director – Security and Capability at Tesco, tells us how the company is using an identity and access...