Wednesday, 11th December 2019
Logo
BLOG

Are businesses going into reverse on cybersecurity?

The time needed by UK organisations to recover from a data breach is increasing. Senior decision makers surveyed for NTT Security’s 2019 Risk:Value report expect recovery to take nearly 100 days on average, double the figure of a year ago. They also believe they would lose more revenue as a result of a breach, forecasting almost 13% in 2019 versus almost 10% in 2018. By Azeem Aleem, VP Consulting, NTT.

Read More

BLOG

Businesses can’t fight what they cannot see

It doesn’t take a rocket scientist to work out that if security teams don’t have full visibility into their organisation’s sensitive data and where it resides, cyber attackers will take advantage. However, this is becoming increasingly difficult as enterprise data and applications move to the cloud and as Internet of Things (IoT) devices and other emerging technologies are introduced, all of which give adversaries an expanding attack surface to target. By Andrew Bushby, UK director at Fidelis C...

Read More

BLOG

Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme Director, TrustArc.

Read More

BLOG

Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme Director, TrustArc.

Read More

BLOG

Gaining a competitive edge on a level technological playing field

By Kevin Drinkall, EMEA Wireless and Cloud Market Development Manager at Zyxel.

Read More

BLOG

How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are already within the network perimeter, often with privileged access to the company’s critical data, systems, and applications. They are a trusted part of the company ecosystem, and their actions are therefore typically more difficult to detect and contain. A malicious insider breach is also one of the most financially ruinous types of data breaches. According t...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more