Posts From Guest Contributor

Back to homepage
Cloud

Hybrid and Multi-Cloud Security: Bulletproof Software Defined Perimeter Implementations

By Don Boxely, CEO and Co- Founder at DH2i, The decentralization of today’s enterprise is a recognized fact. The multitude of cloud benefits—cheap storage, pay-per-use pricing, disaster recovery (DR), and

Industry Insights

Things To Understand To Prevent Data Loss

By Julia Sowells Senior Information Security Specialist at Hacker Combat, Customer data is the lifeblood of any business entity; they are driven towards the increasing obligation of securing it as they

Software

The Only Counter Strategy Against Data Loss: Reliable Backup Methodology

By Julia Sowells Senior Information Security Specialist at Hacker Combat, In the turn of the century 18 years ago, people have embraced Web 2.0, a new dynamic web replacing the static

Industry Insights Software

China Chip Hack Shines Spotlight on Hardware and Supply-Chain Risk

By Jimmy Astle, Senior Threat Reseracher, and Paul Drapeau, Enterprise Architect – Security Efficacy at  Carbon Black, Recent revelations in the press from Bloomberg regarding Chinese hardware implants and supply-chain compromise

Industry Insights

Securing your company’s supply chain with objective information

By Ewen O’Brien, EMEA Director at  BitSight Understanding the risk posed by third- and fourth-party companies can help mitigate security problems In light of the almost daily news of companies

Cloud

Simplifying IT Complexity in the Public Sector

By Roberto Mircoli, CTO EMEA at Virtustream, Government and public sector organisations continue to seek ways to improve services and mitigate the risk of migrating mission-critical applications to the cloud. 

Identity Theft

The Top Security Breaches in History

By Telemessage, Technology has indeed enabled companies of all sizes and nature to rethink and innovate the way they do business. Through the power of the internet, digital platforms, and

Network Security

Access to Thousands of Breached Sites Found on Underground Market

By Vitali Kremez, Director of Reasearch at  Flashpoint, Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of

Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Software

Mind the ‘Cyber Risk’ Gap

By Tom Turner – CEO at BitSight, As the number of digital transactions dramatically increases, so does the risk and likelihood of cyber-attack.  This means that organisations handling large amounts