There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibilit...
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, qu...
“As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention.” - Malcolm Harkins, Chief Security and Trust Officer, Cylance Big budge...
The threat of ransomware is still – unfortunately – alive and well. According to a 2018 study by SentinelOne, their survey of decision makers working in IT and risk, fraud or compliance functions found that six in ten (56%) rep...
The NIS Directive provides legal measures that will boost the overall level of cybersecurity in the EU, particularly for industries and organisations that provide services essential to everyday life and the security of a nation...
Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management (SIEM) solution that centrall...
Machine vision systems are pervasive. You’ll find them everywhere you go and they are part of everything you use. From spam filters to image recognition and processing, they have permeated our daily lives, whether at home, at w...
What options do companies have to respond to, remediate, and mitigate against breaches and being hit by compliance fines? SMEs need protecting more than ever. The volume and viciousness of cyberattacks and data reaches means t...
Business challenge Boosting productivity by minimizing threats Healthcare organizations are the most targeted by cyberattackers. For Southern Cross Care, defending systems across 31 residential aging locations was a huge chal...
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted...