Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business or customer trust greatly outweigh the benefits of securing data. After all, what good is data if you can’t access it. By Trevor Morgan, product manager at comforte AG.
Read MoreHow can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.
Read MoreCyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.
Read MoreBanks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and £16.6 million lost in shopping fraud losses since the beginning of lockdown. Furthermore, with more than 15 billion credentials circulating on the dark web, cybercriminals have everything they need to...
Read MoreThe coronavirus crisis has forced many companies to push ahead with digital transformation at high speed, causing many challenges for IT and security teams. Challenges include the need for extensive hardware purchases and new processes for home office work, but also connecting to the company’s own IT infrastructure and accessing files and apps that employees need. By Ian Pitt, CIO of LogMeIn.
Read MoreThe use of artificial intelligence (AI) is hugely prevalent in almost all aspects of our day-to-day lives including security. Looking at the security landscape, supervised machine learning (ML) is well established in threat detection but unsupervised ML and deep learning are increasingly popular tools for post breach anomaly detection. By Jeremy D’Hoinne, Research Vice President, Gartner.
Read More