NEWS
Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just hasn’t been able to respond to the challenge fast enough, resulting in successful hacks that have resulted in data loss, and malicious cybersecurity related attacks across the globe. Below are some predictions of what 2019 is likely to hold for businesses from a cybersecurity perspective. By David Barker, Founder and Technical Director, 4D Data Centres.

Read More
NEWS
Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack targeting millions of computer routers, firewalls and other networking equipment used by infrastructure operators, government agencies and private companies. According to this alert, the targets of this malicious cyber activity are primarily government and private-sector organisations, critical infrastructure providers, and the internet service providers (ISPs) supporting these sectors. By Anthony Perridge, VP International, ThreatQuotient.

Read More
NEWS
Why have we become desensitised to cyber-attacks?

1989 was of a year of positive milestones which would have a profound impact on the way we live and work today. The World Wide Web was invented, the Berlin Wall was torn down, and the first GPS satellite went into orbit. However, not everything about the year was a cause for celebration. Alongside these progressive developments was the creation of the world’s first computer worm. Initially crafted to test the size of the internet, the worm spread out of control, causing devastation and alerting businesses to the importance of investment in security products including firewalls. This was the first defensive measure in the cybersecurity industry, and now in 2018, a year plagued by cyber-attacks, it is one of the most basic. By Mike Smith, Product Development Manager, Networks and Security at Sungard Availability Services.

Read More
NEWS
Trouble Phishing? How to Avoid Becoming the Next Catch of the Day

If we can take anything from the continuous spate of data breaches, it’s that bad actors and their techniques are more sophisticated than ever and are steamrolling over organisations’ security (or lack thereof) defences. But what’s more intriguing is that despite global increased spending on security, one age-old tactic has stood the test of time: the classic phishing scam. By James Romer, Chief Security Architect EMEA at SecureAuth.

Read More
NEWS
Privileged Passwords: Five Reasons why Separation is Essential

The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business needs to separate people from passwords. By Chris Heslop, Marketing Director, Osirium.

Read More
NEWS
Security alert overload: the real cost of alert fatigue

IT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.

Read More
NEWS
A layer of protection from the outside world

An unfortunate truth in business is that any worker, in any organisation, can be the target of a cyberattack. By David Emm, principal security researcher, Kaspersky Lab.

Read More
NEWS
Why a data breach doesn’t have to mean data loss

Jan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric cyber security strategy can help prevent data loss, even in the event of a breach.

Read More
NEWS
The tumultuous relationship between data and security

Our daily news updates have become littered with data breach after data breach, each costing companies on average £1.82 million. CEOs have lost their jobs and reputations following major leaks, and CSOs wake up each morning dreading the news that personal customer data is in the hands of hackers. By Iain Chidgey VP International, Delphix.

Read More
NEWS
Taking the long view – why threat hunting should underpin strategic IT security

The US Navy SEALs have a well-known motto: “The only easy day was yesterday.” Taking a look at the latest intelligence on the UK cybersecurity landscape it can feel like we’re facing a future that will make the challenges of the past seem like halcyon days. Certainly, all the evidence indicates that the frequency, sophistication and severity of cyberattacks on UK businesses is rising exponentially. However, I believe that while we must accept that there’s no silver bullet for the constantly moving targets that are our cyber adversaries, we can start to build our strategy around proactive, not just reactive tactics, and use threat hunting to underpin our approach. By Rick McElroy, Security Strategist, Carbon Black.

Read More
NEWS
How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years ago, the job title was, more typically, data processing manager or head of data processing, and the job itself tended not to be recognised as a driver of added value. By Ken Mortensen, Data Protection Officer, Global Trust & Privacy, InterSystems.

Read More
NEWS
Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise that the adoption of IT security solutions in corporate businesses is on the rise, with 1.9 billion personal and sensitive data records compromised between January 2017 and March 2018. By Adrian Jones, CEO of Swivel Secure.

Read More

Videos

Steve Young, Senior Vice President and Managing Director of Dell Technologies UK, discusses the complexities of digital transformation, focusing on the importance of avoiding multicloud by default by developing a multicloud by design strategy. Properly implemented, such a cloud smart approach should deliver the speed, flexibility and agility which are the hallmarks of today’s leading digital organisations.
Jon Kane, Channel & Alliances Director EMEA, Gigamon, explains the recent introduction of Gigamon Precryption technology as part of several cybersecurity focused innovations featuring in the latest 6.4 version of the GigaVUE software release. Jon also highlights the opportunity Gigamon’s combined networking, security and observability solutions offer to the Channel as more and more end users look for strategic technology trusted advisors.
Neil MacDonald, UK & Ireland Channel Director for HP Inc., discusses the importance of sustainability to the IT Channel, with a major opportunity for companies to become environmental trusted advisors to end users. Neil outlines the many programmes and initiatives which HP has developed to address key sustainability issues, such as a packaging re-think, tech take back and closed loop recycling, all of which help their Channel partners to deliver measurable sustainability benefits to their customers.
Torbjørn Laursen, Inventor of Inergen, discusses the environmental and cost-saving benefits of the Inergen fire extinguishing system, and also explains how Fire Eater’s Inergen System offers several special advantages for data centre owners and operators.

News

Showcasing how UK open source skills can power the future UK tech economy.
Partnership will underpin Telstra’s managed services offering for security and network transformation.
Although most remain “unsure how it actually works”, 40% of C-level executives are planning to use AI and the advantages that can be gained through Generative AI (Gen AI) such as ChatGPT to cover critical skills shortages, according to new research by Kaspersky.
Aruba S.p.A. - the main Italian provider of cloud services and the leader in Italy for data centre services, cloud, hosting, trust services, e-mail, PEC (certified emails), domain registration and digital signatures - hosted CSC Connections 2023, the international meeting of the Cloud Signature Consortium, held on 22nd and 23rd November. Held at the Aruba Auditorium, the innovative event venue is located within the framework of the Global Cloud Data Centre campus in Ponte San Pietro (BG).