BLOG

The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More

BLOG

When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free Wi-Fi in order to steal data and credentials from off-site employees, creating phony apps for smartphones, and even physically stealing a device as a whole. By Anurag Kahol, CTO at Bitglass.

Read More

BLOG

CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.

Read More

BLOG

IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more than an afterthought, resulting in IoT products that at best, contain half-planned security measures and at worst, are a major liability to any network they connect to. By David Fearne, Global...

Read More

BLOG

Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just hasn’t been able to respond to the challenge fast enough, resulting in successful hacks that have resulted in data loss, and malicious cybersecurity...

Read More

BLOG

Four cyber security challenges that critical infrastructures are facing

Last year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack targeting millions of computer routers, firewalls and other networking equipment used by infrastructure operators, government...

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more