BLOG

Breadth vs Depth: Attacker behaviour detection

One of the biggest challenges in keeping any organisation secure is the sheer volume and range of potential cyber attacks that defences must account for. The complexity of the modern IT environment means there is an endless number of new attack paths waiting to be unearthed by threat actors. By Matt Walmsley, EMEA Director at Vectra.

Read More

BLOG

Zero trust – a rose by any other name…

At a recent forum of senior CTOs, CISOs and analysts, several participants expressed a dislike for the term ‘zero trust’. Comments such as the vagueness of the message, the way different vendors use it and the confusion it caused amongst users made some forum members steer away from its branding for both internal and external communication. The group all agreed that the concepts behind zero trust are sound, but many wanted a better way to describe it to their broader organisations. By...

Read More

BLOG

SaaS data ownership

Turning privacy and governance into competitive advantage. By Joe Gaska, Founder and CEO of GRAX.

Read More

BLOG

Will the death of Privacy Shield be the awakening of European tech?

Ever since Snowden revealed the extent to which US intelligence agencies can so easily access our data, people have become mistrustful of US companies. A survey by GMX last year, for example, revealed that 73% of British internet users mistrust US companies over data protection concerns, which is more than double that of a similar survey in 2015 which showed that only 35% had such concerns. 8% of UK internet users have even left a US online service due to privacy concerns within the last twelve...

Read More

BLOG

Why organisations need SaaS Protection when moving to cloud services

As the Coronavirus pandemic continues to unfold, organisations across all industries have been forced to adapt and adjust their digital transformation projects to meet the needs of a fast-changing world. Covid-19 has not slowed digitalisation down; on the contrary, it has been a key factor in accelerating such initiatives. Partly driven by the need for flexible and remote working, more and more businesses are migrating their data and business operations to the cloud. By Radhesh Menon, Chief...

Read More

BLOG

How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business or customer trust greatly outweigh the benefits of securing data. After all, what good is data if you can’t access it. By Trevor Morgan, product manager at comforte AG.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more