Five key ways machine learning can thwart phishing attacks

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in 2020. 60% of IT leaders believe that phishing is the most significant mobile security threat faced by their organization, according to...

Four key steps to transform cybersecurity into a business enabler

Cybersecurity has traditionally been viewed as the department of ‘no’ – thought to be cautious, restrictive, and restrained. COVID-19 demonstrated this to be far from the truth. When physical offices had to suddenly transform into digital, virtual hubs, cybersecurity became an essential part of the innovation process, rather than a roadblock.

Despite this, recent research shows that fewer than 25% of business leaders view security as a proactive enabler of digital...

Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy. 55% of breaches originate from organized crime groups.Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s...

Protecting privileged identities in a post-Covid-19 world: A guide

Bottom line: Every organisation needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction.

The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service options that protect the health of employees, customers, and partners. Customer experience needs to be the cornerstone of digital transformation,...

Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Gaurang Torvekar, CEO, Indorse: On finding the right business model for a skills marketplace – with blockchain

For any budding entrepreneurs with an idea and a head full of dreams, here are two key lessons that Gaurang Torvekar, CEO of Singapore-based Indorse, has learned: the business model is more important than the idea, and don’t let your technology be the only selling point.

Torvekar (left) firmly describes himself as a founder in the blockchain space, having developed in Ethereum over the past four...

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives...