In an interview sponsored by Kaspersky, security practitioner Naveen Vasudeva, MD and Co-Founder of CISO International, addresses the current disjoint which exists between cybersecurity vendors and their customers. Naveen believes that, as end users wrestle with the complexities of security in the digital age, they need trusted partners who will work with them to help identify and implement optimised solutions.
Read MoreSlowly but surely, more UK employees are being encouraged back into the office, with the Government keen to accelerate this even further. For many businesses, this will be welcome news, especially those who have struggled to adapt to working from home. By Ian Wood, Senior Director, Head of Technology UK&I, Veritas.
Read MoreOne of the biggest challenges in keeping any organisation secure is the sheer volume and range of potential cyber attacks that defences must account for. The complexity of the modern IT environment means there is an endless number of new attack paths waiting to be unearthed by threat actors. By Matt Walmsley, EMEA Director at Vectra.
Read MoreAt a recent forum of senior CTOs, CISOs and analysts, several participants expressed a dislike for the term ‘zero trust’. Comments such as the vagueness of the message, the way different vendors use it and the confusion it caused amongst users made some forum members steer away from its branding for both internal and external communication. The group all agreed that the concepts behind zero trust are sound, but many wanted a better way to describe it to their broader organisations. By...
Read MoreAs the Coronavirus pandemic continues to unfold, organisations across all industries have been forced to adapt and adjust their digital transformation projects to meet the needs of a fast-changing world. Covid-19 has not slowed digitalisation down; on the contrary, it has been a key factor in accelerating such initiatives. Partly driven by the need for flexible and remote working, more and more businesses are migrating their data and business operations to the cloud. By Radhesh Menon, Chief...
Read MoreTraditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business or customer trust greatly outweigh the benefits of securing data. After all, what good is data if you can’t access it. By Trevor Morgan, product manager at comforte AG.
Read More