Securing remote network access for business continuity in times of crisis: A guide

With the coronavirus outbreak continuing to gather pace, many businesses around the world are having to provide remote access for all their employees, sometimes for the first time. This is being done under pressure to tight time constraints. It’s difficult for anyone to do their best work with deadlines looming, and worries and concerns about the current situation playing on their mind. IT staff are no different.

Mistakes and misconfigurations are inevitable and that will...

Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Most organisations still think humans are better than AI in detecting cyberthreats

Almost 60 per cent of respondents polled by WhiteHat Security said they were still more confident in cyberthreat findings verified by humans over those intelligent technologies.

In its latest report, titled “AI and Human Element Security Sentiment Study”, which surveyed 102 industry professionals, WhiteHat Security found over half of the organisations use AI or machine learning in their...

Many companies still compromising mobile security to get things done: Verizon study

Four in 10 companies admit they have ‘sacrificed’ mobile security in the past year, according to the latest study from Verizon.

The report, Verizon’s third edition of its Mobile Security Index, found many companies are leaving themselves at risk through lax security plans. 43% of respondents had sacrificed mobile security over the most recent 12 months, with two thirds (66%) of...

BlackBerry threat analysis report sounds pessimistic warning for retail and automotive brands

If you are in the automotive or retail space, expect more cyber threats in the coming year – according to a new report from BlackBerry.

The company’s 2020 Threat Report, put together using insights from Cylance, the anti-malware provider acquired by BlackBerry one year ago, analysed various attack vectors of interest to bad actors, from coin-mining to ever-sophisticated ransomware...

Cybersecurity firm Deep Instinct announces $43 million series C funding to boost growth

Deep Instinct, a US-based cybersecurity firm has announced its $43 million (£32.95m) series C funding, bringing he company’s total investment to £76.6m.

The funding round was led by Millennium New Horizons, with participation from Unbound, the London-based investment company, along with LG, and existing investor NVIDIA. According to Deep Instinct, the investment will be used to boost...

How CIOs must address the most pressing cybersecurity issues of 2020: A guide

Cybersecurity has become one of the top concerns of enterprises around the world over the past several years, and in 2020, that trend is bound to continue. Privacy legislation like Europe’s General Data Protection Regulation and the upcoming California Consumer Privacy Act will begin to play a larger role in CIOs’ decision-making related to data handling and privacy.

Granted, many...

How the CIO needs to see the evolution of no-code platforms: Security, ML, and democratising data

The low-code and no-code enterprise application platform space, one may have considered, was a part of enterprise digital transformation which has matured, served its purpose, and now been siphoned off by the bigger players in the space.

As far back as 2016, this publication was exploring the right direction for the technology as some of the contending horses fell; Reddo Mobility and StarMobile to name...