Best Practice stories - Page 56
New online tool helps organisations evaluate security maturity
Mon, 17th Sep 2018
#
endpoint protection
#
cloud security
#
risk & compliance
The report also assigns a current security maturity tier and compares the organisation's results to peer benchmarks.
Why enterprises are still grappling with data loss
Thu, 13th Sep 2018
#
edutech
#
dr
#
cloud services
Survey results show that many organisations are not following baseline best practices for data protection and disaster recovery.
Managing OT cybersecurity vulnerabilities at industrial facilities – PAS Global
Mon, 10th Sep 2018
#
manufacturing
#
iot security
#
iot
Focusing on Level 2 endpoints gives only a surface view because they make up only 20 percent of endpoints that exist in process control networks.
Survey: Rising role of IT in physical security provides opportunities
Mon, 10th Sep 2018
#
physical security
#
cybersecurity
#
whitepaper
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.
Exclusive: Venafi talks weaponisation of machine identities
Wed, 29th Aug 2018
#
hackers
#
venafi
#
certification
As companies integrate more digital tools into their business, many of them remain unaware of the risk code-signing certificates are exposing them to.
Exclusive: Veeam's best practices for availability in a cloud era
Mon, 27th Aug 2018
#
virtualisation
#
dr
#
cloud security
How can businesses ensure their apps and data are available across the new multi-cloud models they are adopting?.
SailPoint updates IdentityIQ to expand definition of digital identities
Fri, 24th Aug 2018
#
iam
#
cybersecurity
#
bots
The update gives enterprises the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.
Google reveals AI system taking charge of its data centres
Mon, 20th Aug 2018
#
datacentre infrastructure
#
hyperscale
#
dc
Once used only on a recommendation basis, the AI system is now taking direct control of Google's data centres with significant energy savings.
Blurred lines: How counterinsurgent strategies apply to threat hunting
Wed, 15th Aug 2018
#
endpoint protection
#
advanced persistent threat protection
#
edr
Successful counterinsurgency operations depend on thoroughly understanding the environments in which they are being conducted.
Data classification: What's the point of brushing off 'digital dust'?
Wed, 8th Aug 2018
#
storage
#
opinion
#
data classification
To a lot of us data is boring but a necessary evil. Our organisations create documents that end up being stored somewhere, gathering digital dust.
Bug bounty marketplace in sore need of standardisation – report
Wed, 1st Aug 2018
#
report
#
bug bounty
#
crest
Bug bounty programmes lack standardisation, says a CREST report urging the establishment of best practices to protect researchers and organisations alike.
Networking is experiencing a paradigm shift due to IBN
Tue, 31st Jul 2018
#
opinion
#
allied telesis
#
ibn
Intent-Based Networking set to transform network management with streamlined operations and AI-driven solutions.
WatchGuard launches multi-factor authentication for SMBs
Mon, 30th Jul 2018
#
firewalls
#
network infrastructure
#
network security
WatchGuard launches AuthPoint, a cloud-based multi-factor authentication solution tailored for SMBs, addressing their cost and complexity concerns.
The race to keep ahead of healthcare cyber threats
Mon, 30th Jul 2018
#
breach prevention
#
cybersecurity
#
healthtech
Healthcare cyber-attacks soar; 50% of firms hit, latest ServiceNow report reveals urgent need for security upgrades.
Interview: MuleSoft discusses the security risks in IoT
Thu, 26th Jul 2018
#
mulesoft
#
security by design
#
partners
IoT's rise poses grave security risks; enterprises seek secure integration and API-led strategies, experts say.
AirTrunk appoints two new recruits – says focus is on APAC expansion
Thu, 12th Jul 2018
#
hyperscale
#
dc
#
airtrunk
AirTrunk hires Dana Adams as new COO and William Nicholson as technical director of critical environments to expand its presence in Asia Pacific.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Time capsule app TimeHop breached, 21 million users affected
Tue, 10th Jul 2018
#
firewalls
#
mfa
#
cloud security
The breach occurred as an access credential to TimeHop's cloud computing environment that didn't have multifactor authentication was compromised.
Collaboration tool APIs leaving organisations vulnerable
Mon, 9th Jul 2018
#
uc
#
firewalls
#
breach prevention
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
Why internal financial controls are more important than ever
Tue, 3rd Jul 2018
#
data protection
#
blackline
#
study
Global research from BlackLine suggests that data is increasingly seen as one of a company's most crucial assets, yet it's always at risk.