With growing threats, CISOs change their posture to proactive
Every CISO and IT security professional knows that cyber risks are exploding, with cybercrime syndicates becoming increasingly aggressive and sophisticated. To their credit, security execs are putting out fires and putting mitigation measures in place as fast as they...
Indicators of Behaviour and the Diminishing Value of IOCs
How secure is your organisation if you can only stop attacks that have already been detected in other environments based on Indicators of Compromise (IOCs)? Secure enough, if those were the only attacks you needed to be concerned with. By Cybereason Sales Director for...
The ultimate security pincer movement
Cybersecurity is a battlefield. An alarming one. According to the Allianz Risk Barometer, the risk of a cybersecurity breach ranks higher than supply chain disruption, a natural disaster and even the Covid-19 pandemic. This is a reasonable concern, after all, 93% of...
How to spot a crypto scam
Since the emergence of Bitcoin in 2009, cryptocurrency has gained significant traction in popularity over the years, with more and more people investing in the now many variations of digital currencies available such as Ethereum, Tether, Binance, and even Dogecoin. By...
Zero Trust Network Access the next step in an evolving security landscape
The hybrid workplace continues to enjoy consistent adoption, particularly amongst those industries that do not require their workforce to be at the office every day. The benefits are well-published and tangible, however, it has also brought with it smorgasbord of...
Data management at the core of ransomware readiness
Ransomware is one of the biggest threats and challenges facing organisations today. A simple online search will reveal hundreds of high-profile attacks and scary statistics around the acceleration of ransomware incidents and the costs involved. By Kate Mollett,...
Is the public cloud secure?
Is the public cloud safe? Organisations often have this concern as they engage services from third-party cloud hosts. They may have a point - the public cloud is not necessarily as secure as we want to think. The rise in cyberattacks partially correlates with the...
Cybersecurity depends on the people too
Check Point Software Technologies marks Cybersecurity Awareness Month (October) by highlighting the need for each and every individual to prioritise cybersecurity, in both their business and personal lives, in order to fend off the ever-increasing risk of cyberattack....
Get back to security basics
Cybersecurity is everyone's problem. It is the problem of the beleaguered chief information security officer (CISO), of the CEO and the manager; and of every employee at every level of the organisation from the person serving the tea to the person leading the team....
Trellix finds open source projects could be at risk
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence. Comprised of hundreds of the world's most elite security analysts and researchers, the Advanced Research Center produces actionable real-time...
Step up your surveillance game with Seagate SkyHawk™
When looking for a hard drive to power your CCTV security network, a standard HDD won’t do the trick, as the need for always-on operational demand and high-definition images is simply too high. Surveillance drives are specifically focused on mass data and speed - and...
Kaspersky invites young innovators to step up
Kaspersky has announced an open call for Secur'IT Cup '22 - the international competition for talented motivated students, and young researchers seeking to change the world of technology by enhancing its security. With the increasing penetration of digital technology...