February 7, 2023
Via: ComputerWeeklyThe websites and mobile applications of some of the UK’s most popular retail banks are riddled with security flaws that are putting consumers at risk of falling victim to digitally enabled fraud, according to a report from consumer organisation Which?. […]
February 6, 2023
Via: DATAVERSITYThe World Economic Forum has released its Global Cybersecurity Outlook 2023 report, and it highlights how things have changed when it comes to data security and cybersecurity in general. It cites the inevitability of more cyber laws and regulations in […]
January 23, 2023
Via: DATAVERSITYAll enterprise data ends up on storage systems, but if an enterprise storage solution does not have the cyber storage resilience to combat a cyberattack, the C-suite and the IT team are leaving the organization severely exposed. This realization is […]
January 13, 2023
Via: CIOWhat critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise. It is something all of […]
January 10, 2023
Via: Network WorldEncrypt backups Encrypted backup data cannot be used to extort your company. Attackers might be able to exfiltrate it, but it will be useless without the keys. Encryption technology has evolved to a point that this can be handled with […]
December 29, 2022
Via: ComputerWeeklyHacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie on, hunched over a keyboard, in front of multiple screens, attacking an innocent business, or individuals, online. It automatically generates […]
December 28, 2022
Via: DATAVERSITYSecurity Operations (SecOps) refers to a joint effort between operations and IT security teams to maintain a company’s safety and minimize potential threats. An increasing gap typically opens between information security and IT operations teams as the former grows in […]
December 28, 2022
Via: ComputerWeeklyDigital fraud and risk teams seem to be locked in a perpetual game of catch-up. Every five to 10 years, new technology comes along which gives us an advantage, until the hackers and fraudsters evolve themselves – and so the […]
December 22, 2022
Via: CIOCyber hygiene offers a preventative approach to future attacks in order to avoid costly remediation and recovery incidents – much like dental hygiene recommends flossing and brushing to avoid later cavities and painful procedures. Asking a good CISO which applications […]
December 19, 2022
Via: DATAVERSITYData security is an issue that faces every organization that uses or stores sensitive data. Even a minor data breach can expose a business to crippling financial penalties from regulators, civil action by aggrieved data owners, and irreversible corporate reputation […]
December 7, 2022
Via: Database Trends and ApplicationsCybersecurity and threat detection continues to be top of mind moving into 2023. Data breaches and the capture of sensitive information remain concerns for organizations large and small. Just in 2022, the average cost of data breaches reached $4.35 million […]
December 6, 2022
Via: InfoWorldIt’s a fact that most enterprises put security teams and tools in a silo. It drives me nuts when I see these bad habits carried over to cloud computing security. I covered this topic three years ago, and for the […]
December 6, 2022
Via: DATAVERSITYAccording to an annual cybersecurity report by Cisco, cyber-attacks are more advanced than ever before. Phishing, ransomware, social engineering, and trojans are the most active threats. Globally, the average total cost of a data breach is around $4.35 million, which […]
November 2, 2022
Via: ComputerWeeklyRansomware changes rapidly. At a technical level, attack infrastructure can change by the minute, operationally changing attack techniques while strategically targeting certain sectors, industries or regions at appropriate times. Access brokers work across multiple groups, operators switch botnets, and malware […]
October 31, 2022
Via: CIOFor network administrators, passwords are like an old but increasingly unreliable friend. While easy to use on a single site, employees often choose weak ones, which makes them easy to brute force. Even when they’re strong, using them across multiple […]
October 25, 2022
Via: InfoWorldThe Cloud Security Alliance, in partnership with security company BigID, released the results of a survey of 1,500 IT and security professionals. They all weighed in on the state of cloud data security in 2022 and had some not-so-surprising data […]
October 21, 2022
Via: InfoWorldWe’ve made a point of shoring up security for infrastructure-as-a-service clouds since they are so complex and have so many moving parts. Unfortunately, the many software-as-a-service systems in use for more than 20 years now have fallen down the cloud […]
BI Security, Software & Systems
October 20, 2022
Via: ComputerWeeklyOn 14 September 2022, the White House released Memorandum M-22-18, which requires executive departments and agencies of the US government to ensure that all companies providing them with software and services are sufficiently protected against cyber attacks. “The Executive Order […]
October 12, 2022
Via: ComputerWeeklyThe Information Commissioner’s Office (ICO) has issued reprimands to seven public and private organisations over failures to respond to requests for personal information, but experts have questioned why the regulator chooses to publicly disclose some reprimands and not others. Under […]
October 10, 2022
Via: ComputerWeeklyContainers have quickly become a fundamental part of DevOps. Their lightweight and portable nature makes them attractive to all sizes of organisation, from small startups trying to reduce costs to large multibillion-pound companies wanting to ensure service availability. Compared with […]