BLOG

The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By Simon Church, General Manager and Executive Vice President, Europe at Optiv.

Read More

BLOG

Network Segmentation: how to make it work for you, every day

Corporate networks have quickly become more and more complex. Change requests are regularly processed in the hundreds by IT security teams, which are then applied to company owned network devices. As a result, underlying network configuration processes increase in size and complexity, impacting the resources needed to manage the required changes. By Andrew Lintell, Regional Vice President at Tufin.

Read More

BLOG

Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed...

Read More

BLOG

GDPR and mitigating cyber-risk

For digital businesses across all industries and markets, there are a number of risks which freelancers and contractors may face as a result of the new regulations. Here, Janthana Kaenprakhamroy, founder of on-demand insurance provider Tapoly, discusses the ins and outs of GDPR and the risks cybersecurity breaches can pose to freelance and contract workers in the digital age.

Read More

BLOG

How unguarded privileged access can turn a breach into a catastrophe

It has become increasingly accepted by many organisations that a security breach, in some form or another, is unavoidable. Even the most robust and cutting-edge security defences can potentially be thwarted by a dedicated adversary armed with new attack techniques. From the downtime to the cost of the clear-up, the impact can be devastating: in fact, a 2017 study by Ponemon estimated that the average data breach carried a total cost of $3.62m. By Joseph Carson, Chief Security Scientist at...

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more