SOX, data protection and compliance: Part 2

Security teams can relatively easily monitor and enforce data classification and data handling policies in enterprises and large corporations as we saw in Part 1 yesterday. Depending on how sensitive,

Read more

Hackers prosper thanks to security’s blurred lines of responsibility

Permanent loss of data. Four words no CIO ever wants to hear, especially in the run up to General Data Protection Regulation (GDPR). But when delivery firm TNT confessed it

Read more

Is a certain level of fraud an acceptable cost of doing business?

Every business, in every area, risks being a victim of fraud. High profile issues such as cyber-attack or DDoS get the headlines, but often it is simpler issues that cause

Read more

Short, frequent, low-volume DDoS attacks continue to dominate

Service providers, hosting providers and digital enterprises are all impacted by DDoS attacks. But besides the headline-grabbing volumetric attacks, another more sinister DDoS method lies in the shadows.

Read more

Three key network strategies for the connected enterprise – Part 2

Successful rollout of enterprise digital transformation continues to be a mixed bag. We continue to see the explosive increase in connected devices (the IoT phenomenon) and large advances in application

Read more

Three key network strategies for the connected enterprise – Part 1

Successful rollout of enterprise digital transformation continues to be a mixed bag. We continue to see the explosive increase in connected devices (the IoT phenomenon) and large advances in application

Read more

The enterprise manager’s checklist to getting to grips with DDoS attacks and the Botnet army

Distributed Denial of Service (DDoS) attacks jumped into the mainstream consciousness last year after several high-profile cases – one of the largest and most widely reported being the Dyn takedown

Read more

Telcos: when it comes to IoT security, prevention is always better than cure

Smart devices have arguably made consumers’ lives easier, and as they become more affordable, more of us are investing in the IoT. However, all too often, these smart devices are

Read more

DDoS via the Internet of Things – the first wave of attacks?

In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing:

Read more

Are partnerships more important than standards?

To remain relevant and competitive businesses must embrace the Internet of Things (IoT). However, a significant collateral challenge faced in doing so is managing the torrent of data these “Things”

Read more