BLOG

What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered including: the ethics of paying ransoms, to politicised destructive attacks and the new ‘anchors’ of compute infrastructure in a remote world. Here we look at some of the key discussion points:

Read More


BLOG

The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers to a halt was borne out of a student’s bedroom in the Philippines, just over 20 years ago. Mark Nutt, EVP EMEA at Veritas, is taking a look back at when the computer virus was unleashed and the ripples it sent forward in time. Not only did “LoveBug” infect over 45 million devices, but it became a catalyst for the multi-billion-dollar ransomware crime industry that we know today.

Read More



NEWS

Remote working leads to increases in cyber attacks

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working practices brought on by COVID-19, with 65% of organisations noting they have either been breached or exposed to an attack. That’s one of the key findings from HLB’s Cybersecurity Report which launched recently.

Read More

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite...
As we approach a year of what has now become out-of-office working, cybersecurity continues to be...
Report indicates that consumers are likely to avoid conducting business with an organization that...
More than 60 percent of organisations not leveraging established hardening benchmarks.
Solution gives customers a fast and secure way to verify identity while reducing fraud.
Passwordless solution provider invests heavily in Europe with new hires and new Frankfurt data...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more