IT teams face skills shortage

Brocade has published a new Global Digital Transformation Skills Study, which aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future business demands. Of the six markets surveyed, Germany was found to be the best prepared to meet its digital transformation goals, closely followed by the U.S., while the UK lagged well behind its counterparts.








NTT Security combines regional assets to launch The Global Threat Intelligence Center

NTT Security, the specialised security company of NTT Group, has formed the Global Threat Intelligence Center (GTIC) to replace what was known formerly as the Security Engineering and Research Team (SERT), which last year transitioned under the NTT Security brand.





Industrial computers under attack

On average two-in-five computers, related to the technological infrastructure of industrial enterprises, faced cyberattacks in the second half of 2016. This is a finding from Kaspersky Lab’s report “Threat Landscape for Industrial Automation Systems. The second half of 2016.” The percentage of industrial computers under attack grew from over 17 per cent in July 2016 to more than 24 per cent in December 2016, with the top three sources of infection being the Internet, removable storage devices, and malicious e-mail attachments and scripts embedded in the body of e-mails.









Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.







Accelerating incident response

CyberArk has introduced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks.




Connected successfully