For a long time many have thought of identity security as a necessary burden. All those passwords, all those access denials, all that budget drained away from the profit centres of the enterprise - that's how many business leaders view this aspect of IT instead of recognising its benefits. The truth is quite different. By Saira Guthrie, Senior Product Marketing Manager, Ping Identity.
Read MoreAt a recent forum of senior CTOs, CISOs and analysts, several participants expressed a dislike for the term ‘zero trust’. Comments such as the vagueness of the message, the way different vendors use it and the confusion it caused amongst users made some forum members steer away from its branding for both internal and external communication. The group all agreed that the concepts behind zero trust are sound, but many wanted a better way to describe it to their broader organisations. By Phil All...
Read MoreBy Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.
Read MoreA recent HP panel discussion sought to provide some answers to this question – topics covered including: the ethics of paying ransoms, to politicised destructive attacks and the new ‘anchors’ of compute infrastructure in a remote world. Here we look at some of the key discussion points:
Read MoreYou may be surprised to learn that one of the first computer viruses to bring millions of computers to a halt was borne out of a student’s bedroom in the Philippines, just over 20 years ago. Mark Nutt, EVP EMEA at Veritas, is taking a look back at when the computer virus was unleashed and the ripples it sent forward in time. Not only did “LoveBug” infect over 45 million devices, but it became a catalyst for the multi-billion-dollar ransomware crime industry that we know today.
Read MoreWhy business decision makers should expand their network security strategy, By Chris Connell, Deputy Vice President of Global Sales and Director of European Operations, Kaspersky.
Read More