BLOG

Introducing security to the DevOps cycle

Keeping your software delivery in peak condition. By Jeff Keyes at Plutora.

Read More

BLOG

Securing our infrastructure: 3 steps OEMs need to take in the IoT age

Often when we think about cybersecurity, especially about the impacts of breaches, our minds turn to the consumer space where most of us have experienced slow computers, ad pop-ups from malware and, in some cases, data loss when we’ve had to completely reformat our storage drives. By Vivek Shah, Senior Director of Product Management, Syncron.

Read More

BLOG

When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is priceless and requires special handling to mitigate the risk of data breaches. By Paul Trulove, CPO at SailPoint.

Read More

BLOG

Cloud era technology needs cloud era security

The huge popularity of cloud services has seen organisations outsource applications, data and infrastructure to third party providers with the result that security perimeters have widened significantly. This has brought with it unwanted attention from cybercriminals, not only because cloud offers a potential route into corporate IT networks, but also due to the scope to evade detection from traditional security solutions. By Anurag Kahol, CTO at Bitglass.

Read More

BLOG

Assessing the delicate cybersecurity “fire triangle”

A physical roaring fire and a digital cyberattack might not have much in common – but these very different forces leave a similar a trail of destruction in their wake. By Pat Krupa, Head of Product and UX, SmartFrame.

Read More

BLOG

How cloud service providers can plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA) scheduled for implementation in 2020 and a raft of similar regulations on the horizon across the Asia Pacific region. It’s clear that GDPR is just the opening act in a narrative that will result in a...

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more