Remote working during the Covid-19 pandemic: Top cybersecurity tips

COVID-19 is having a relentless impact on business services and operations. Against the new backdrop of millions working remotely, the stage is clearly set for a renewed approach to cyber security. Technology changes must be coupled with clear guidance disseminated throughout your organisation, to help staff identify potentially suspicious activity and appropriately handle company  data. 

Layer your security 

One area in particular that subjects employees and the wider...

The rise of intelligent automation: How to take advantage of the augmented workforce

2019 has become a record year for AI investment in the UK. Despite this growth, 51% of business execs don’t expect to see financial returns from using AI until three-to-five years’ time. One of the reasons for the slow return on investment is because automation solutions in use today are simply unsuitable for unstructured data, which will make up 80% of the world’s data by 2025, and there isn’t enough visibility and awareness...

CISOs are burning out: Here’s how to fix it

Everyone experiences stress in their jobs, but security leaders may have it worse than most. According to recent research, 60% of CISOs admit they rarely disconnect from work, while 88% work more than 40 hours per week. It’s no surprise that 51% of tech executives experience stress-related illnesses as a result of cyberattacks, tech outages, and breaches – a number that increases to 56% among CTOs and CIOs.

How Walmart – among others – fell victim to recent customer phishing scams

One thing we know about consumer-focused cyber criminals is they’re more likely to strike during busy shopping periods. Black Friday – the day after Thanksgiving – and Cyber Monday, the first Monday after the holiday, are well-known to be hotbeds of cyber-criminal activity.

With this in mind, in the days leading up to Mother’s Day and Memorial Day 2019, Segasec monitored several...

MobileIron aims to kill off the password completely with further move to Zero Trust

Enterprise mobile software provider MobileIron has announced an update to its Access mobile security and identity platform with a zero sign-on solution which aims to finally replace the password as a security authenticator.

The company’s vision is to enable enterprises to use their mobile devices as their digital identity to access enterprise services and data, built on its unified endpoint...

Case study: How the National Crime Agency looks to squash the cybercriminals at source

Ben Russell, head of cyber threat response at the National Crime Agency (NCA), wants to get one thing clear. “We’re not a regulator – we’re not here to dish out fines,” he says. “We’re here to support businesses, investigate the criminals and try and catch people in order to help.”

The agency is not here to judge, or enforce anything in particular, but to...

Is there room left for privacy in the digital world?

Just as Native Americans sold the island of Manhattan to colonial governor Peter Minuit for $24 worth glass beads - at least, that’s what the legend says - people are now selling out their private data for “glass beads” to Facebook and Google. For data drilling companies, profit comes first, privacy last. They sacrifice everything for growth and engagement for their platforms in order to collect as much data as possible to profiteer from advertising.

Is there...

Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain...

Gartner identifies seven steps to bring down risk of security threats from Spectre and Meltdown

It is beneficial for leaders in the security and risk management field to adopt a pragmatic and risk-based approach to deal with the ongoing security threats posed by the "Spectre" and "Meltdown” vulnerabilities, according to Gartner.

Gartner identifies seven steps that security and risk heads can follow to bring down the risks associated with security threats.

Almost all modern IT systems are at risk of security threats so all desktops, mobiles, servers,...

One in four companies only use passwords as BYOD defence, research finds

Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.

The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).

For those who do use...