Archive
It used to be said that if you had your head in the clouds you were a daydreamer, someone who was incapable of concentrating on a single thing for long enough to achieve something. However, as we move deeper into
A report published by Verizonin April revealed that 89% of business data breaches had a financial or espionage motive. The Verizon 2016 Data Breach Investigations Reportassessed over 64,000 data breach incidents in 82 countries. It identified that 63% of confirmed
Du today announced plans to revolutionise healthcare in the UAE using pioneering blockchain technology for the first time in the UAE to introduce a safer common system for instantly sharing and verifying electronic health records (EHR) between hospitals and clinics.
Given the massive global push to take computing off premises, a move to the cloud in the legal sector is inevitable – in fact, it is already happening. We all know about the benefits of cloud – more scalability and
Three Effective Ways to Make Application Security Testing a Successful Part of Your DevOps Program
From the latest agile development tools to innovative delivery platforms such as containers, DevOps is changing how people and businesses work. But the novel software development approach of DevOps can also result in unique challenges, one of the most significant
The problem with today’s endpoints is that they are so varied: a mix of desktop PCs, laptops and netbooks, frequently with different versions of OS and applications being used across organisations’ estates. This variety of endpoints also means that security
This sneaky botnet shows why you really, really shouldn’t use the same password for everything
While automated attacks by a networked army of computers aren’t a new problem, the methods that botnets are using are getting more complex. They’re also increasing in number with the latest cybercrime report from ThreatMetrix suggesting that the number of
Advanced Persistent Threats are a constant concern for the IT Director, the CIO and, lately, the entire C-Suite. Every day, we learn about how a new piece of malware has penetrated a supposedly protected IT environment. How does the APT
Symantec is cutting 1,200 staff and simplifying its enterprise security portfolio as part of plans to shave $400m (£277.5m) off its annual costs. The security vendor, recently shorn of its Veritas information management business, set out details of its efficiency
Communications and networking might be overlooked by smart cities, missing out on the potential capabilities of partnering with telecoms to build “heterogeneous networks” that deliver service to multiple platforms. The Global Mobile Suppliers Association (GSA) claims — in its latest
It’s often assumed, at least within tech circles, that traditional enterprise is slow to adapt to emerging trends. That may have been true in the past, but it is becoming increasingly less so. After seeing smaller players maneuver quickly to
Some companies will pay hackers up to US$1 million in ransoms to claw back stolen data according to a poll by the Cloud Security Alliance. The survey garnered 209 respondents of which half were in IT security and a third
Encrypting the huge number of data files stored in a public cloud today is like bubble-wrapping an entire house. Better to focus on the fragile items that matter. The unprecedented level of access points into corporate domains leaves information security
We are all somewhat familiar with Intrusion Prevention Systems (IPSs). But what is all this talk of Web Application Firewalls (WAFs)? What is a Web Application Firewall and how does it differ from an IPS? First, let’s take a quick
Is it possible to successfully defend your enterprise against advanced persistent threats (APTs)? Ponemon Institute’s latest “State of Advanced Persistent Threats” study, sponsored by Trusteer, an IBM company, revealed the pessimism that many IT security professionals feel about their ability
5 ERP Security Risks to Be Aware Of
One of the interesting things about the term ERP is that it is a name that as much describes what the software aspires to as what it actually does. What do I mean by that? Take the example of a