Why are web apps are so frequently insecure? Here are five reasons
The unrelenting move to the cloud means that web apps are becoming ever more common. They have also increasingly become targets for hackers and this is often because of security failings; many of the...
View ArticleThe vulnerability and threat landscape in 2016
Vincent Smyth, general manager and senior vice president of EMEA at Flexera Software puts forward his threat and vulnerability predictions for 2016. Companies will have the power to prevent most hacks...
View ArticleWhen a job title is not enough: Why do CISOs only stay with you for 18 months?
In the past, businesses were run by a small senior management team headed up by a managing director who reported to a president or board of directors. In addition, there were line managers who had a...
View ArticleSecurity in 2016: Four key cyber-criminal trends to expect
Hackers will truly embrace the ‘Internet of Things’: We’ve been talking about the ‘Internet of Things’ (IoT) for some time, but in 2016, IoT will rapidly expand the attack surface and present a very...
View ArticleSerious vulnerability discovered in Trend Micro’s software
Antivirus software is a must for both businesses and consumers to protect themselves against the myriad of threats online. [see_also] However, sometimes this software can offer a backdoor into a users...
View ArticleRaytheon Websense transforms into Forcepoint and unveils new products
Cyber security firm Raytheon Websense today unveiled a new company name to build on the recent acquisition of the Stonesoft next-generation firewall (NGFW) business from Intel. [see_also] The two...
View ArticleDDoS attack: Threat of the month
The largest scale of internet attacks enlist thousands or tens of thousands of previously hacked computers to simultaneously attack and overwhelm the websites and e-commerce services of selected...
View ArticleHow can Blockchain redefine the relationship between the UK government and...
Blockchain is fast becoming the buzzword of 2016 – and we are only in the first month of the year! Conversations are stretching far and beyond its use in Bitcoin as many industries are starting to...
View ArticleCyber threats more global and dynamic than ever
Signature-based security could be virtually useless as 97 per cent of malware is unique to a specific endpoint, says a new report. This is among the findings of the latest annual Webroot Threat Brief...
View ArticleNew platform helps SMEs with cyber threat response
Cyber attacks don’t discriminate when it comes to the size of the organisation. But smaller enterprises can lack the resources needed to effectively deal with them. [see_also] Incident response...
View ArticleImplementing Disaster Recovery as a Service to avoid losing your business
Protecting a business from natural disasters and unwanted trespassers will probably come as second nature. But in the age of a digital revolution, protecting data from cyber intrusion, human error and...
View ArticleThe urgent need to secure critical infrastructure from cyber-threats
The world is not ready for cyber-attacks on critical infrastructure. Governments are not ready, law enforcement isn’t ready, the facilities themselves are not ready, and the people who design, build...
View ArticleQ&A: Driving growth in the application security market
WhiteHat Security – an ethical hacking company – is 15 years old this year and is now experiencing something of a teenage growth spurt, both in terms of customers and headcount. [see_also] In what is...
View ArticleSecurity must be the starting point, not an afterthought
The current threat landscape means that security can no longer be an afterthought for businesses, so needs to be baked into every part of an organisation from the start rather than added in after....
View ArticleRisk of cyber threats doubles during UEFA Euro 2016
The 2016 UEFA European Championship more than doubled the risks for digitally active sports fans, according to a new report from Allot Communications Ltd. in collaboration with Kaspersky Lab....
View ArticleQ&A: Where businesses are going wrong with cloud security
Data security and data protection are areas that can’t be ignored in the modern business landscape that is filled with cyber threats a-plenty. [see_also] We sat down with Patrick Heim, Head of Trust at...
View ArticleEnterprises still falling short on mobile security
Enterprises are still not doing enough to protect corporate data on their employee’s mobile apps and devices from cyber threats, according to a new report from MobileIron. According to the Mobile...
View ArticleWould you trust a robot with your businesses security?
Businesses face an ever increasing challenge to protect their assets from cyber criminals. The sophistication and frequency of attacks continue to elevate as these criminals take advantage of rapidly...
View Article