Cybersecurity and threat news for Europe, the Middle East & Africa
Gartner’s top 10 tech trends for 2019
Gartner has released a list of what it sees as the most important strategic tech trends to be aware of in the quickly upcoming year.
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Small businesses repeatedly falling victim to ransomware - Kaspersky
Many SMBs have fallen victim to multiple attacks – with 37% having experienced two or three infections.
Interview: RSA's Craig Dore on the basics of MFA
A good MFA solution would cover access for both types of applications, and enable access for both employees and third parties such as contractors.
Mozilla delays distrust of Symantec TLS certificates
Mozilla has delayed its distrust of all Symantec security certificates – because so many businesses have failed to do anything about the problem.
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Exclusive: CrowdStrike’s roundup of threats so far in 2018
“Increasingly, we see criminal groups are also using the techniques and tradecraft that were typically the domain of nation states to break into companies.”
Why protecting your DNS should never be an afterthought
Being such an integral part of the internet infrastructure makes DNS a popular target for cyber criminals looking to attack organisational networks and data.
Trend Micro’s four pillars of cybersecurity strategy
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
Carbon Black announces enhanced cloud security offering
The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.
The rise of the chief compliance officer – Digital Guardian
What does the role entail, and does your organisation need one?
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
How Symantec aims to buff up cloud security in APAC
Symantec recently announced innovations and expansions to its cloud security portfolio.
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Interview: Hitachi Vantara talks challenges of compliance in financial services
Technology is advancing a lot quicker, and the incumbent banks need to be more up to speed but are held back by a lot of legacy systems.
Credential theft industry booming in US, declining in Asia & EU
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Chinese espionage: Sweating Apple insists breach allegations are ‘not true’
The dust still hasn't settled on the report that caused Supermicro's stocks to collapse, and now Apple is stressing its innocence.
Google shutting down Google+ after covering up privacy bug
Google’s management was aware of the bug but chose not to share it with the public to avoid scrutiny by regulators.
Access to thousands of breached sites found on Russian underground market
A number of the available servers investigated by Flashpoint led analysts to conclude that most of the breaches are from either US, Russian, or German hosting services.
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
How online retail businesses need to bundle security into customer experience
E-commerce sites, in particular, are increasingly targeted by hackers due to the sensitive payment card information.
Unintended recipients: The minor action causing major compliance problems
"With GDPR now in full effect, it is vital that businesses of all sizes protect the sensitive information they hold."
Supermicro, Apple, & Amazon vs crippling scandal – who’s lying?
A report has exploded claiming Chinese spies have managed to plant backdoors into servers sold from Supermicro to some of the world's biggest players - all of whom deny it.
Security spending to reach $133.7bil in 2022 – IDC
The United States will be largest geographic market for security solutions with total spending of $39.3 billion this year.
Carbon Black: Is your cyber panic room ready?
Cyber spies and cyber criminals alike are setting our networks on fire.
Report finds AI is a key cybersecurity weapon in the IoT era
Increasingly, security professionals are looking to artificial intelligence (AI) as a key weapon to win the battle against stealthy threats inside their IT infrastructures.
GCSB exposes Russia's involvement in malicious cyber attacks
“Such behaviour is unacceptable – it is counter to New Zealand’s vision for an open, safe and secure cyberspace," comments GCSB director-general Andrew Hampton.
Exclusive: Moving away from passwords to two-factor authentication
New developments in ‘zero log-in’ technology look set to redefine the authentication process as we know it and put paid to the dubious protection offered by passwords.
Palo Alto Networks to expand cloud security capabilities with RedLock acquisition
The acquisition is expected to close during Palo Alto Networks fiscal first quarter, subject to the satisfaction of customary closing conditions.