The threat landscape facing businesses is more complex than ever and it's rapidly changing. No surprise then that traditional approaches to security are struggling to cope.
This has led some security companies to turn to a more dynamic approach of seeking out threats rather than simply responding to attacks.
Businesses are collecting more data about their operations and their customers than ever before. But data in itself is only part of the story. For it to be useful it's necessary to spot patterns and gain insights.
At this point most businesses turn to analytics, but this can only tell you what's happened in the past. To predict future trends means using algorithms to build models of what may be complex systems.
Last year saw the Mirai botnet harness routers and other IoT devices to launch DDoS attacks against internet services.
Is this type of attack something we’re going to see more of in 2017, and what can companies and individuals do to protect themselves? We spoke to Sam Rehman, chief technology officer at attack prevention specialist Arxan Technologies to find out more about security and the Internet of Things.
We tend to think of storage as being a target when it comes to malware attacks with cyber criminals seeking to steal data or encrypt it to demand a ransom. But in fact technology can make storage part of the solution.
Hybrid storage specialist Reduxio believes innovative storage can be used to fight and defeat ransomware and malware. We spoke to Reduxio's Jacob Cherian (VP of product strategy) and Mike Grandinetti (chief marketing and corporate strategy officer) to find out how.
As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe.
But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know.
As traditional password security methods become increasingly discredited, enterprises are turning to other technologies to secure systems and transactions.
Though many of the technologies are still in their infancy, others are becoming mainstream. We spoke to David Gerulski, vice president of fingerprint device specialist Integrated Biometrics to find out more about then latest technologies and how they're being used to address privacy concerns.
The growth of cloud usage, increasing volumes of information and a switch towards software defined systems based on commodity hardware have all had an impact on the storage market.
About a year ago we spoke to Mark Lewis, Chairman and CEO of storage specialist Formation Data Systems to get his views on the future of enterprise storage. This week we caught up with Mark again to find out how much the market has changed in just a short time.
Threats like ransomware means it’s more important than ever to keep your computers safe both online and off.
Emsisoft has just released Anti Malware 12, the latest version of its respected anti-malware software, and Christian Mairoll, the company’s CEO, took time to speak to me about the ever evolving threat landscape, the best ways to keep your system safe, and the benefits of paid versus free solutions.
Traditional authentication methods are struggling to keep up with the expansion of online services. Yet additional systems like two-factor authentication can prove to be cumbersome.
The answer may lie in analysis of behavioral biometrics which can be used to determine wether credentials are being used legitimately. We spoke to Neil Costigan CEO of Swedish company BehavioSec to find out more about where it’s already being used and how it could change the way we access banking and other services.
Ransomware is an increasingly severe threat to all organizations and government agencies are not exempt. The Federal Trade Commission recently labeled ransomware as "among the most troubling cyberthreats".
But why are government agencies such an attractive target and what can they do to combat the threat? We spoke to Andrew Hay, chief information security officer of data security specialist DataGravity to find out.
Enterprise use of the public cloud is taking off in a big way and it's estimated that by 2018, half of the applications running in public cloud environments will be considered mission-critical by the organizations that use them.
But migrating legacy applications to the cloud can lead to new security risks as how the application is used and hosted could differ from the original deployment.
ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.
To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.
The question many businesses are asking themselves is, 'should we be moving to the cloud?' The public cloud is clearly a success, as shown by the significant adoption of Amazon Web Services (AWS). Companies are benefiting from the pay-as-go nature of the cloud, as well as from the ability to turn up services as needed without the traditional hardware spend. Gartner recently reported that cloud computing will affect more than $1 trillion in IT spending by 2020.
But even with this growing popularity, corporate IT departments are still struggling with how to integrate public clouds into their data center initiatives. One of the main reasons for this hesitation is the uncertainty around maintaining workload performance once the data gets to the cloud. This is a valid concern, but one that can be overcome. We spoke to Len Rosenthal, chief marketing officer for infrastructure performance specialist Virtual Instruments, to discuss how workload analysis and modeling is the first step for any cloud migration initiative.
If your laptop or smartphone gets lost or stolen, there’s the danger of its contents being accessed, which could prove a nightmare. If the device is encrypted, however, you can rest easy… Or can you?
Ebba Blitz, CEO of laptop encryption company Alertsec (and former host of Sweden's Shark Tank), chatted with me about the benefits and potential pitfalls of encryption, and revealed her top tips for keeping your data secure.
We recently sat down with George Brasher, the managing director for UK and Ireland at HP, to discuss his approach to business and how the company has changed since the split from HP Enterprise.
You can read the Q&A below.