Protecting privileged identities in a post-Covid-19 world: A guide

Bottom line: Every organisation needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction.

The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service options that protect the health of employees, customers, and partners. Customer experience needs to be the cornerstone of digital transformation,...

Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Gaurang Torvekar, CEO, Indorse: On finding the right business model for a skills marketplace – with blockchain

For any budding entrepreneurs with an idea and a head full of dreams, here are two key lessons that Gaurang Torvekar, CEO of Singapore-based Indorse, has learned: the business model is more important than the idea, and don’t let your technology be the only selling point.

Torvekar (left) firmly describes himself as a founder in the blockchain space, having developed in Ethereum over the past four...

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives...

The four necessities for effective email security incident response

Cybercriminals are escalating their phishing attacks across the globe, causing many organisations to scramble for new email security solutions to mitigate the risks. In fact, Gartner predicts that global cybersecurity spending will reach $170.4 billion by 2022, with more than $18 billion earmarked for anti-phishing, as business security evolves to address more frequent and complex email threats.

In...

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The...

Symantec acquires Appthority to help secure the modern endpoint

Symantec has acquired mobile security provider Appthority to ‘reinforce its commitment to protect modern endpoints and operating systems.’

The move will see Appthority be immediately placed into Symantec’s endpoint security arm, and comes a year after the latter acquired mobile threat defence provider Skycure.

Among Appthority’s...

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally...