Oct 21, 2014
The “castle and moat” approach to IT security is ineffective in an era where threats are likely already within the enterprise, and the real risk lies in what leaves the enterprise, not what gets in, writes Fortinet security consultant Jonas Thulin. Back in the days...
Oct 15, 2014
The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting, and they learn...
Oct 15, 2014
Research reveals time and again that weak login credentials, including passwords, remain among the top causes of data breaches around the world. Despite this, individuals continue to choose weak and insecure passwords to protect their most sensitive data. Simon...
Oct 14, 2014
Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cybercriminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the growing...
Oct 9, 2014
The level of innovation, research and development that defines access control in business reflects how seriously decision makers view this facet of operations management. The ability to compete in any industry or sector today is heavily dependent on the availability...
Oct 7, 2014
Cyber-attacks are a threat to businesses of all types and of all sizes, from the giant enterprises to the smaller SMEs. A popular maxim is that there are two types of companies – those who have been breached, and those who have been breached but don’t know it....