Thursday, 17th October 2019
Logo
BLOG

Securing cities in the cyber age

It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now expect to have, have a much larger appetite. By Mike Nelson, VP of IoT Security, DigiCert.

Read More

BLOG

Four questions organisations need to ask after a cyber attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again? Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation. It’s not enough to be aware that an attack is taking (or has taken) place. There are four key questions organisations n...

Read More

BLOG

Why 5G will require next-generation security to combat real-time cyber threats

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors. It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network. By Gunter Reiss, VP Strategy, A10 Networks.

Read More

BLOG

De-bunking the myths of AI cyber security

Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with many providers attempting to jump on board and jostle to use the latest industry buzzword, services are being incorrectly marketed as ‘AI-based’, leading to much confusion. By Neil Kell, Director of Evolve Secure Solutions, part of the CSI group.

Read More

BLOG

Empowering developers through security

Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years. It’s a market that continues to expand, and is expected to reach $933.62 billion by 2025. As it flourishes, enterprises are flocking to get a share of the pie. But it has now become clear that the pace to market is being prioritised over security. That’s because the opportunity is huge, but so is the risk. By Martin Wimpress, Developer Advocate at Canonical.

Read More

BLOG

Keeping Data Safe in the Cloud – the Essential Checklist

Earlier this year a US software engineer hacked into a server holding the personal information of more than 100 million Capital One customers, in what was described by prosecutors as one of the biggest data thefts from a bank. It is potentially the most-feared scenario for many organisations: the hacker had gained access via a ‘misconfiguration’ of a firewall on a web application, allowing her to communicate with the server where Capital One stored its information. By Gordon Sockett, Content Pr...

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more