Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy. 55% of breaches originate from organized crime groups.Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s...

Protecting privileged identities in a post-Covid-19 world: A guide

Bottom line: Every organisation needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction.

The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service options that protect the health of employees, customers, and partners. Customer experience needs to be the cornerstone of digital transformation,...

Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Gaurang Torvekar, CEO, Indorse: On finding the right business model for a skills marketplace – with blockchain

For any budding entrepreneurs with an idea and a head full of dreams, here are two key lessons that Gaurang Torvekar, CEO of Singapore-based Indorse, has learned: the business model is more important than the idea, and don’t let your technology be the only selling point.

Torvekar (left) firmly describes himself as a founder in the blockchain space, having developed in Ethereum over the past four...

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives...

The four necessities for effective email security incident response

Cybercriminals are escalating their phishing attacks across the globe, causing many organisations to scramble for new email security solutions to mitigate the risks. In fact, Gartner predicts that global cybersecurity spending will reach $170.4 billion by 2022, with more than $18 billion earmarked for anti-phishing, as business security evolves to address more frequent and complex email threats.

In...

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The...