Network
Reinventing security postures in the COVID work from home era
A report by Sectigo looks at how companies have modified their cybersecurity, compliance and digital identity practices for our suddenly evolved workspaces. Tim Callan, Senior Fellow, Sectigo explains how working from home has changed the cybersecurity landscape. COVID-19 and the ‘new...
FireEye introduces Mandiant Solutions for security teams
FireEye, an intelligence-led security company, has announced the formation of Mandiant Solutions. “Over the past 15 years, the crown jewels of Mandiant have historically been our incident response expertise and the intelligence that comes from it,” said Kevin Mandia, Chief Executive...
What impact has COVID-19 had on the data breach landscape?
Cybercriminals have taken advantage of the disruption and uncertainty caused by COVID-19. Phillip Larbey, Managing Principal for Europe, Middle East and Africa at Verizon Enterprise Solutions, lays out the cybertrends which have most impacted businesses during this time. Since we launched the...
SureCloud and FirmGuard join forces to deliver tech-enabled cyber and GRC services
Provider of Gartner recognised Integrated Risk Management (IRM) solutions and cybersecurity services, SureCloud, teams up with Australian information security, governance, risk and compliance specialist, FirmGuard, to deliver a suite of pioneering tech-based services. The strategic partnership...
Features
Nuance voice biometrics to boost security at Santander
Nuance Communications, has announced Santander is making phone banking more seamless and secure through Voice ID, a system that leverages...
Password protection: Tips on how to secure the ‘keys to the kingdom’
Research from LastPass by LogMeIn, a leader in password management, has revealed that while businesses are making strides in...
CyberArk expert on securing the paperless health service
The increased use of electronic personal information, coupled with rapid advances in healthcare technology, has created complex...
Insights
Passing on passwords: How to embrace the new identity era
The username and password have long been the baseline method for protecting accounts, but for consumers and businesses alike,...
Subex expert on the cyberthreats facing manufacturers
Attacks on manufacturing organisations can be particularly disruptive and, with the ongoing convergence of IT and OT systems, it’s...
Protecting the IoT-driven network – a multi-stage approach
Simon Wilson, CTO HPE Aruba UK and Ireland, gives us invaluable advice on deploying a multi-stage strategy to ensure protection...
Pulse Secure expert on getting past the tool glut of the modern enterprise
Research has revealed that the average organisation uses multiple tools to handle VPNS, MFA, NAC, NGFW, MDM and more. But do we really...
Case Studies
Infosys deploys RSA solutions to protect and manage extensive global infrastructure
IT giant, Infosys, has half a dozen strategic partners it relies on to deliver key components of its security stack. Executives from the...