Tag: Cyber Security

The TRAPpings of Success

Cyberthreats are becoming increasingly sophisticated, and the number of endpoints compromised continues to grow at an alarming rate, even though almost every endpoint globally is protected by antivirus (AV) software.
Despite the continuous investments in traditional antivirus solutions and “next-gen” AV products, organisations continue to experience cyber breaches and successful ransomware attacks with increasing frequency. The security industry and traditional antivirus […] Read more…

Cyberthreats are becoming increasingly sophisticated, and the number of endpoints compromised continues to grow at an alarming rate, even though almost every endpoint globally is protected by antivirus (AV) software. Despite the continuous investments in traditional antivirus solutions and “next-gen” AV products, organisations continue to experience cyber breaches and successful ransomware attacks with increasing frequency. The security industry and traditional antivirus […]

Read more…

5 Things Retail CEOs should know about Security and Optimising Business Results

As large, embarrassing data breaches continue to expose big box and e-commerce retailers around the world, retail CEOs and line-of-business executives can no longer afford to ignore security. Hits to reputation, PCI compliance fines, bank fees, incident response and lawsuits add up fast when organisations fail to comply with PCI and secure their IT assets.
Here are 5 things to help […] Read more…

As large, embarrassing data breaches continue to expose big box and e-commerce retailers around the world, retail CEOs and line-of-business executives can no longer afford to ignore security. Hits to reputation, PCI compliance fines, bank fees, incident response and lawsuits add up fast when organisations fail to comply with PCI and secure their IT assets. Here are 5 things to help […]

Read more…

New Petya Ransomware Discovered: How Juniper protects

Juniper Networks is aware of a new variant of the Petya malware family. The malware combines a number of existing techniques to spread across vulnerable clients. We have begun the process of analysing today’s samples of Petya in the lab and can report that we are able to detect and prevent infection using our SkyATP and IDP technologies. Juniper will […] Read more…

Juniper Networks is aware of a new variant of the Petya malware family. The malware combines a number of existing techniques to spread across vulnerable clients. We have begun the process of analysing today’s samples of Petya in the lab and can report that we are able to detect and prevent infection using our SkyATP and IDP technologies. Juniper will […]

Read more…

Exploring SDSN

A recent, in-depth report by economic and cybersecurity experts at RAND found that chief information security officers are faced with a chaotic and confusing landscape when deciding how to manage the risks (and costs) associated with providing security to their business.
More troubling is the fact that the research indicated that while companies are increasingly spending on cybersecurity tools, they are […] Read more…

A recent, in-depth report by economic and cybersecurity experts at RAND found that chief information security officers are faced with a chaotic and confusing landscape when deciding how to manage the risks (and costs) associated with providing security to their business. More troubling is the fact that the research indicated that while companies are increasingly spending on cybersecurity tools, they are […]

Read more…

Preparing your organisation for GDPR

From 25 May 2018, the EU General Data Protection Regulation (GDPR) will affect the way that all organisations manage their data. There are big changes ahead – data protection will become harder, there will be more audits and there will be large fines for not reporting breaches within 72 hours.
With so many businesses operating across borders, international consistency around data […] Read more…

From 25 May 2018, the EU General Data Protection Regulation (GDPR) will affect the way that all organisations manage their data. There are big changes ahead – data protection will become harder, there will be more audits and there will be large fines for not reporting breaches within 72 hours. With so many businesses operating across borders, international consistency around data […]

Read more…

Will you be ready for GDPR and NIS?

According to research conducted by Palo Alto Networks and IDC, most organisations think that they are already compliant with NIS directives, with just eight per cent believing that they won’t be ready in time. However, as it is still possible that the directive may change as it is adopted by member states legal frameworks, nobody can be sure that they […] Read more…

According to research conducted by Palo Alto Networks and IDC, most organisations think that they are already compliant with NIS directives, with just eight per cent believing that they won’t be ready in time. However, as it is still possible that the directive may change as it is adopted by member states legal frameworks, nobody can be sure that they […]

Read more…

How will your business be affected by the NIS directive?

The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. For NIS, companies providing what the law describes as essential or digital services will be affected by these changes. All companies processing personal data of EU residents must comply […] Read more…

The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. For NIS, companies providing what the law describes as essential or digital services will be affected by these changes. All companies processing personal data of EU residents must comply […]

Read more…

How will you define ‘state-of-the-art’?

With the May 2018 implementation date fast approaching, all organisations should be carefully considering what ‘state-of-the-art’ means to their organisation. The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks.
The NIS Directive introduces the concept of “state of the […] Read more…

With the May 2018 implementation date fast approaching, all organisations should be carefully considering what ‘state-of-the-art’ means to their organisation. The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. The NIS Directive introduces the concept of “state of the […]

Read more…

Network Security – A top down approach

The Product
Every so often I see interesting new products from network and security vendors which provide innovative answers to particular security issues. Then I consider how an organisation would procure and deploy these new solutions, given the existing range of security products from multiple vendors and a certain degree of product overlap.
There are plenty of point products around and a […] Read more…

The Product Every so often I see interesting new products from network and security vendors which provide innovative answers to particular security issues. Then I consider how an organisation would procure and deploy these new solutions, given the existing range of security products from multiple vendors and a certain degree of product overlap. There are plenty of point products around and a […]

Read more…

Another day, another high profile cyber attack – Have you taken action yet?

Waking up this morning to the news of another serious cyber attack, this time against phone and broadband provider TalkTalk, serves as a sober reminder of the vital importance of cyber security.
The sustained attack against TalkTalk has resulted in the loss of personal customer data which potentially includes names, addresses and even credit card and bank details. The severity of […] Read more…

Waking up this morning to the news of another serious cyber attack, this time against phone and broadband provider TalkTalk, serves as a sober reminder of the vital importance of cyber security. The sustained attack against TalkTalk has resulted in the loss of personal customer data which potentially includes names, addresses and even credit card and bank details. The severity of […]

Read more…