By Ian Kilpatrick, EVP Cyber Security, Nuvias Group.
Read MoreThe main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By Simon Church, General Manager and Executive Vice President, Europe at Optiv.
Read MoreCorporate networks have quickly become more and more complex. Change requests are regularly processed in the hundreds by IT security teams, which are then applied to company owned network devices. As a result, underlying network configuration processes increase in size and complexity, impacting the resources needed to manage the required changes. By Andrew Lintell, Regional Vice President at Tufin.
Read MoreWhat makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed...
Read MoreNo matter the size, all organisations are at risk of being the next target of a cyber-attack. Attacks take on a variety of forms, from phishing scams, malware to ransomware, each requiring its own security measures. So how do you as a business owner protect your organisation against a multitude of growing cybersecurity threats? By Steven Malone, Director of Security Product Management at Mimecast.
Read MoreBy Liviu Arsene, senior e-threat analyst at Bitdefender.
Read More