BLOG

Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More

BLOG

Are increasing data breaches leaving consumers desensitised?

Cyberattacks are on the rise, with novel cybersecurity risks emerging as companies are currently forced to do business in unprecedented ways. By Stefanie Wood Ellis, AntiFraud Product & Marketing Director, OpSec Security.

Read More

BLOG

Cloud-based multi-factor authentication: the starting point for security, compliance and user experience

Banks and businesses are constantly under pressure to keep their data, customers, and employees secure. This has heightened in the last few months, as the global pandemic has seen cybercriminals ramp up activity. The number of phishing websites increasing by 350% since the start of the year, and £16.6 million lost in shopping fraud losses since the beginning of lockdown. Furthermore, with more than 15 billion credentials circulating on the dark web, cybercriminals have everything they need to...

Read More

BLOG

A moment of reflection: A CIO’s perspective on the remote working transition

The coronavirus crisis has forced many companies to push ahead with digital transformation at high speed, causing many challenges for IT and security teams. Challenges include the need for extensive hardware purchases and new processes for home office work, but also connecting to the company’s own IT infrastructure and accessing files and apps that employees need. By Ian Pitt, CIO of LogMeIn.

Read More

BLOG

Before adopting Artificial Intelligence, CISOs must answer the following questions

The use of artificial intelligence (AI) is hugely prevalent in almost all aspects of our day-to-day lives including security. Looking at the security landscape, supervised machine learning (ML) is well established in threat detection but unsupervised ML and deep learning are increasingly popular tools for post breach anomaly detection. By Jeremy D’Hoinne, Research Vice President, Gartner.

Read More

BLOG

Outside the four walls of the data centre

Almost four in 10 people in the EU began working remotely in the first few months of 2020, according to a study carried out by Eurofund. This is a seismic shift considering that the amount of people who regularly worked remotely before the pandemic took hold ranged from as low as 6% to as high as 23%, depending on country. By Michael Cade, Senior Global Technologist, Veeam.

Read More

Despite investment in cyber security, employees are still putting organisations at risk,...
As evidenced by the onslaught of ransomware attacks and data breaches making the news almost daily...
Program will provide global MSSPs world-class, human-driven anti-phishing offerings that increase...
Recording a complete and accurate record of network activity lets analysts quickly troubleshoot...
Underwriters and brokers have been warned the vast majority of UK businesses are unprepared to...
Vectra research finds most cyberattacks against the energy and utilities industry transpire and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more