Best Practice stories - Page 54
The top technologies shaping future 'proactive' cybersecurity
Tue, 12th Feb 2019
#
data analytics
#
blockchain
#
martech
Frost & Sullivan has highlighted emerging technology trends that are set to change the way enterprises protect themselves against cybercrime.
Report finds automotive industry seriously wanting in cybersecurity
Fri, 8th Feb 2019
#
cartech
#
supply chain
#
cybersecurity
Findings from a new report have laid the automotive industry's cybersecurity practices bare after highlighting critical cybersecurity deficiencies.
Symantec announces new endpoint response tools
Thu, 31st Jan 2019
#
endpoint protection
#
partner programmes
#
edr
Enterprise IT and Security Ops teams are increasingly challenged to investigate and respond to advanced and emerging threats with available resources and staff.
Proofpoint: Social engineering and credential stuffing attacks up in 2018
Wed, 30th Jan 2019
#
phishing
#
email security
#
cloud services
Proofpoint's 2018 report reveals a surge in social engineering attacks, with phishing incidents up 9% and credential compromises rising 70% since 2017.
Exclusive Q&A: Why businesses are storing useless hardware
Wed, 30th Jan 2019
#
hybrid cloud
#
hyperscale
#
dc
In this exclusive interview, Blancco's Fredrik Forslund details just how expensive the issue of data centre waste has become.
Varonis updates data security offering
Thu, 24th Jan 2019
#
data privacy
#
microsoft
#
threat intelligence
Version 7.0 of the Varonis Data Security Platform features new cloud and threat detection and response capabilities.
Frost & Sullivan honours Honeywell's IIoT value creation
Wed, 23rd Jan 2019
#
uc
#
honeywell
#
broadband
Frost and Sullivan has awarded Honeywell the 2018 Global Customer Value Leadership Award for its cybersecurity innovations and transformative IIoT solutions.
Why it's critical to deploy emerging technologies in ways that will benefit society
Tue, 22nd Jan 2019
#
digital transformation
#
biometrics
#
quantum computing
Society needs to move beyond trusting emerging technologies and focus on deploying them in ways that benefit society, says Unisys chief trust officer.
How to successfully phase out legacy physical security systems
Mon, 21st Jan 2019
#
physical security
#
identity cards
#
security card
Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them.
Palo Alto says supply chain is cybersecurity's weakest link
Fri, 18th Jan 2019
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks warns that supply chains are the weakest link in cybersecurity, urging firms to evaluate partners' defences to prevent breaches.
Security: A miserable job?
Fri, 11th Jan 2019
#
multi-cloud
#
cybersecurity
#
servicenow
The security sector is a tough industry to be in – when all processes are running smoothly, security professionals are invisible.
AI: Get started now, but on the right foot.
Mon, 7th Jan 2019
#
uc
#
martech
#
ai
AI specialist Rick Rider's guide to getting AI experimentation right as the technology becomes a necessity in 2019.
Cyber Readiness Institute launches global training program
Wed, 2nd Jan 2019
#
martech
#
commerce systems
#
supply chain
The Cyber Readiness Institute is launching a new program to help small businesses understand basic cybersecurity issues.
How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
5 strategies for widening the colocation data centre talent pool
Fri, 21st Dec 2018
#
datacentre infrastructure
#
hyperscale
#
power / energy
The colocation industry has one of the lowest unemployment numbers across industries, making talent acquisition a difficult task.
Disruption in the supply chain: Why IT resilience is a collective responsibility
Fri, 14th Dec 2018
#
dr
#
supply chain
#
cloud services
Organisations must build resilient relationships to thrive in the face of disruption, using IT infrastructure to promote trust, agility, and collaboration.
Businesses too slow on attack detection – CrowdStrike
Thu, 13th Dec 2018
#
malware
#
ai security
#
ai
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Critical data centre operations is just like F1
Thu, 13th Dec 2018
#
network infrastructure
#
datacentre infrastructure
#
hyperscale
Schneider's David Gentry believes critical data centre operations share many parallels to a formula 1 race car team.
Hands-on Review: Quick and easy authentication with YubiKeys
Wed, 12th Dec 2018
#
gaming
#
mfa
#
digital entertainment
Consumers tend to believe that setting up two-factor authentication puts them at the height of cybersecurity best practice – but this belief is misled.
Using blockchain to ensure regulatory compliance
Wed, 12th Dec 2018
#
uc
#
ecm
#
blockchain
Macro 4's new Columbus DW software enhances data protection & regulatory compliance through document redaction & blockchain integration.