All IT Security Technology articles – Page 4
-
ebook
6 Questions to ask about any BaaS
To find the right BaaS solution, you need to ask the right questions.
-
Blog
The journey to automation
Cyber security defence strategies are too often reliant on manual processes - this needs to change as we enter the age of AI, argues Jan Tietze
-
Blog
Driving cloud security from the edge for post-COVID success
Investments in cloud infrastructure have helped companies survive a potentially catastrophic period in the pandemic. Now it’s time to look at boosting security from the edge, argues David Shepherd.
-
News
97% of businesses ‘experienced cyber attacks via mobile devices last year’
Nearly every business polled reported a cyber-attack via a mobile device last year, according to research by cyber security firm Check Point Software Technologies
-
News
Israeli regtech AML firm ‘considers public listing’ ahead of expected AI boom
Israeli cyber security firm ThetaRay is considering listing on the stock market following an increase in the valuation of regtech companies.
-
Video
The Financial Services Guide to Reducing Data Security Risks
Real-time sales and marketing activities benefit from holistic views of customer activity, but this comes with the heightened risk of sharing sensitive financial and personal information both within and outside of the organization.
-
News
McAfee sells enterprise arm for $4bn to focus on consumer business
Anti-virus software producer McAfee has agreed to sell its enterprise business to a consortium led by private equity firm, the Symphony Technology Group (STG), for $4.0bn (€3.33bn).
-
Analysis
The Internet of Things: strategic principles and best practice
The rise of the Internet of Things (IoT) presents new security challenges and risks. Ahead of his appearance at PrivSec Global, Arun DeSouza answers questions on how to ensure your IoT strategies are up to date and effective.
-
ebook
The Key Pillars for Protecting Sensitive Data
Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough.
-
News
Jamaica launches criminal investigation into weakness of Covid-19 app
The Jamaican government has begun a criminal investigation after a security vulnerability was discovered associated with the JamCovid-19 app which people travelling to the country have to use to gain authorisation to enter.
-
Analysis
PrivSec fundraising deals in January and February 2021
A round-up of some of the latest fundraising and business deals in the cyber security , data protection and privacy sectors
-
Blog
Bridging the gap between business goals and security requirements
Involving as many people as possible in the security process strengthens practices, thereby closing the gap between business users and security teams, argues Alex Armson
-
News
FTC settles with travel insurer for lax security on cloud database
The Federal Trade Commission (FTC) in the US has finalised a settlement with SkyMed International over allegations that the emergency travel services provider failed to take reasonable steps to secure sensitive consumer information.
-
ebook
A Practical Guide on How to Protect Your Organization’s Sensitive Data
IT Security teams are looking for a holistic approach to solving today’s data security challenges, with a data security platform that enables them to identify and protect sensitive data wherever it resides, using a comprehensive set of data protection mechanisms and centralized policy and key management.
-
News
4,000 files feared stolen in cyber attack on Scottish regulator
An environmental regulator in Scotland has confirmed that at least 4,000 files have been accessed and likely stolen by criminals in an ongoing cyberattack on its systems.
-
Report
Nine cybersecurity trends to watch out for in 2021
PrivSec Report identifies nine major themes we expect to be talking points in the new year in the world of cybersecurity
-
Sponsored
Data locality is a compliance control, not a security control
Data locality is increasingly seen as important, but is there confusion as to why it matters? Microsoft’s Mark Anderson explains what he believes to be the real reason for its importance
-
News
UAE suffers “250% increase” in cyber attacks this year
Cyber attacks have risen sharply this year, according to Mohamed Al-Kuwaiti, Executive Director of the UAE’s National Electronic Security Authority, CNBC reported.
-
Video
The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack
The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.
-
Video
Data Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.