The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...
Read MoreCorporate networks have quickly become more and more complex. Change requests are regularly processed in the hundreds by IT security teams, which are then applied to company owned network devices. As a result, underlying network configuration processes increase in size and complexity, impacting...
Read MoreWhat makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done...
Read MoreFor digital businesses across all industries and markets, there are a number of risks which freelancers and contractors may face as a result of the new regulations. Here, Janthana Kaenprakhamroy, founder of on-demand insurance provider Tapoly, discusses the ins and outs of GDPR and the risks...
Read MoreIt has become increasingly accepted by many organisations that a security breach, in some form or...
Read MoreNo matter the size, all organisations are at risk of being the next target of a cyber-attack....
Read MoreBy Liviu Arsene, senior e-threat analyst at Bitdefender.
Read MorePrivacy in the age of the algorithm.By Robert Brown, AVP, Cognizant's Center of the Future of Work.
Read MoreBy Eric Schrock, CTO at Delphix.
Read MoreThe ongoing impact of GDPR, by Dan Harding, Director, Sign In App.
Read MoreBy Anthony Perridge, VP International, ThreatQuotient.
Read MoreBy Patrick Frost, Professional Services Network Consultant at LAN3.
Read More