MobileIron launches phishing protection for enterprise mobile devices

mobile phishing

Credential theft via social engineering is a major cause of data breaches, but with a more dispersed workforce it becomes harder to guard against.

Security platform MobileIron is launching a new multi-vector mobile phishing protection solution for iOS and Android devices to help organizations defend themselves.

Continue reading

Debunking four object storage myths

Storage


There is no arguing the fact that data continues to grow at an exponential rate, particularly unstructured data, which is predicted to represent 80 percent of all data by 2025. And because of trends likes IoT, the continued proliferation of mobile devices and the rise of remote work, this growing data is being used and accessed in new ways.

At the same time, it’s become increasingly clear that traditional SAN and NAS storage technologies cannot scale to meet these data growth demands nor support the need for data to be readily accessible from anywhere and at any time. To ensure these surging volumes of data are accessible and manageable, more and more enterprises are turning to object storage to meet their storage needs. However, there are still several misconceptions that persist about object storage. Here are four myths about the technology debunked.

Continue reading

Remote working boosts move to cloud-based security

Secure cloud

New research from security management platform Exabeam reveals that 88 percent of UK security practitioners have accelerated their move to the cloud, driven by the need to support a remote workforce.

Significantly, almost half of respondents (44 percent) are now using cloud-based security products to protect their corporate financial information. This is a sharp increase compared to Exabeam's earlier study where just 12 percent were protecting corporate financial information in this way.

Continue reading

How machine learning is changing digital marketing [Q&A]

Marketing compass

Increasingly customers expect personalized experiences that are relevant to their unique situations and needs. However, with the increased reliance on technology needed to provide this, the human angle can go by the board.

We spoke to Jon Perera, CMO at sales and marketing software specialist Highspot to learn more about how people, processes and technology can be aligned to offer optimum customer experience.

Continue reading

1Password launches tool to guard against credential stuffing

Hacker typing username and password

Reuse of the same or similar passwords across accounts makes life easier for cybercriminals as they are able to try multiple servers using credentials exposed in breaches -- so called 'credential stuffing'.

Enterprise password manager 1Password is launching a new reporting tool for its users that allows them to swiftly identify compromised accounts and take action to protect the enterprise by alerting users to create new secure passwords.

Continue reading

What enterprises need to consider on the journey to digital transformation [Q&A]

digital transformation

Digital transformation is increasingly seen as a way for businesses to gain competitive advantage. It's often tied into the cloud and as-a-service solutions too.

But what do businesses need to take into account when starting on a transformation project? We spoke to Anthony Brooks-Williams, CEO of cloud data integration provider HVR Software to find out.

Continue reading

How IoT devices are putting enterprises at risk

Wireless internet of things

While businesses generally take care to protect desktop and mobile computing devices, the rise in IoT usage has meant that lots of potentially less secure equipment is sneaking onto networks.

Forescout Research Labs has been assessing the risk of over eight million devices across a number of industries via its Forescout Device Cloud, a repository of connected enterprise device data.

Continue reading

Three of the biggest concerns (and opportunities) facing today's tech workers

worried man

As of last year, there were 12.1 million tech workers in the United States, according to TechRepublic. Throughout the 2010s, the tech sector workforce expanded by 23 percent with no significant dips or net job losses beyond the Great Recession early in the decade. While these numbers have declined due to the COVID-19 pandemic -- the tech sector lost a record 112,000 jobs in April -- the tech industry is still growing and will likely continue to grow as the economy reboots and the world moves toward a new normal.

Here are three of the biggest challenges and opportunities that tech professionals will encounter in the coming months and years:

Continue reading

How giving customers a better experience can build competitive advantage [Q&A]

happy customer

In a highly competitive world businesses can struggle to make themselves stand out from the competition. One of the ways they can gain a competitive edge is by providing a better customer experience.

But what does this mean in practice and how can organizations build better experiences? We spoke to Ross Freedman, co-founder and CEO of customer experience agency Rightpoint to find out.

Continue reading

Illumio brings zero trust to the endpoint

endpoint protection

Endpoints are generally the weakest point of a corporate network and the problem is made more acute by the shift to remote working.

Illumio is launching a new endpoint protection solution that reduces the risk of ransomware and malware propagating laterally throughout an organization.

Continue reading

New solution helps enterprises handle sensitive data

folder stack

When looking at adopting a SaaS solution a big concern for enterprises is the risk involved in sending data out to be managed, stored, processed, and analyzed by a third party.

Code analysis and debugging specialist Rookout is launching Data On-Prem, a solution which gives large enterprises the ability to quickly solve complex problems involving sensitive data.

Continue reading

Extreme weather will inflict chaos on infrastructure

Weather cloud

In the coming years, extreme weather events will become more frequent and widespread, devastating areas of the world that typically don’t experience them and amplifying the destruction in areas that do. Exposing deficiencies in technical and physical infrastructure, these events will cause major disruption and damage to IT systems and assets. Data centers will be significantly impacted, with dependent organizations losing access to services and data, and Critical National Infrastructure (CNI) will be put at risk.

Widespread droughts will force governments to divert water traditionally used to cool data centers, resulting in unplanned outages. In coastal areas and river basins, catastrophic flooding, hurricanes, typhoons or monsoons will hit key infrastructure such as the electrical grid and telecommunication systems. Wildfires will lead to prolonged power outages, stretching continuity arrangements to breaking point. The impact of extreme weather events on local staff, who may be unwilling or unable to get to their workplace, will put operational capability in jeopardy. The magnitude of extreme weather events -- and their prevalence in areas that have not previously been prone to them -- will create havoc for organizations that have not prepared for their impact.

Continue reading

Three ways to automate business processes with no-code solutions

process automation

Business process automation has become a strategic enabler of business agility for present-day organizations, from helping to speed up business processes and reduce errors, to eliminating repetitive work. It has quickly become an essential tool that an increasing number of CIOs are utilizing across their organizations. Automation helps mid- to large-sized enterprises, dealing with various interrelated processes, to unify and streamline day-to-day work internally. The right automation tools can not only save time and money, increase productivity and enhance quality of work, but also streamline communication, improve management and retain customers.

The difference between no-code versus low-code solutions is that the latter requires technical "know-how" of the product and is extremely difficult for regular business employees to use. No-code solutions provide your average business employees the ability and independence to build solutions based on their own needs, without dependency on the IT staff. Below are three ways to automate business processes with no-code solutions:

Continue reading

Half of security professionals had no plan for a pandemic scenario

Confused woman

New research from Bitdefender shows that half of information security professionals didn't have a contingency plan in place -- or didn't know if they did -- for a situation like COVID-19 or similar.

Yet 86 percent admit that attacks in the most common vectors have been rising during this period. Cyberwarfare and IoT as an attack vector were reported to be up by 38 percent, and APTs, cyberespionage IP theft and social media threats/chatbots by 37 percent -- all of which could turn 2020 into a bumper year for breaches.

Continue reading

Over reliance on passwords compromises security

Hacker typing username and password

Four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused credentials.

A new report on access management from Thales also reveals that a majority of respondents say their organization plans to expand the use of usernames and passwords, even though the limitations could pose security challenges.

Continue reading

Load More Articles