Archive

Back to homepage
Identity Theft

Cyber Security Breaches Survey 2018

In response to findings from the UK Cyber Security Breaches Survey, IT security experts commented below.“The report highlights some key issues that businesses and charities in the UK are facing,

Hardware/Network

Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their vulnerabilities,

Industry Insights

Senior IT execs admit to more cyber threats than they can control

Surveying over 1,000 senior IT executives, from 18 countries, only 9% said they have made cyber-security a board-level priority. 31% of IT execs admit they only refresh their cybersecurity strategy

IT Compliance

GDPR compliant: Respecting data Is the new currency of trust

What are the most significant factors related to GDPR to maximise the value of data for customers’ benefit while remaining GDPR compliant? Following GDPR, unless organisations can argue for another

Hardware/Network

Make storage your secret weapon to protect unstructured data

By adopting object-based scale out storage, your organisation can deal with exponential data growth in a secure and cost-effective way.The amount of unstructured data—freeform information that does not fit neatly

Industry Insights

Redefining mission critical systems in the world of analytics-driven security

How should security operations determine what systems require the most attention? IT and security infrastructure are at a crossroads. With the current technological advancements in cloud, IoT and the “as

Hardware/Network

What is a Cybersecurity Technology Platform Anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes. At last week’s RSA Conference, you couldn’t walk more than 10

Industry Insights

It’s Time for A Change To Cybersecurity Consumption

Widespread adoption of the cloud has made business executives and board members comfortable with the idea of paying for IT resources and services “by the glass.” Moving to such a

Software

Making the ROI of Cyber Attackers Unattractive

“I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies

Industry Insights

Cybersecurity – now a top boardroom priority

UK businesses are facing a series of regulatory demands, including the much talked about GDPR, which is now fewer than 65 days away. Compliance has become a key boardroom issue