The rise of Ransomware-as-a-Service and how organisations can protect themselves

By Keith Glancey, Head of Solutions Architect at Infoblox Over the years, ransomware has become an increasingly popular attack method for hackers looking to make a large return on investment. The COVID-19 pandemic only accelerated this problem further, opening up new opportunities for cybercriminals to cause disruption and find vulnerabilities. As businesses continue to struggle […]
Cybersecurity priorities: Why AI-powered threat detection should be in your plans

By Atech Cloud The changed world we’ve found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated cyberattack of all time, the reverberations of which have been felt throughout […]
Salesforce security: 5 ways your data could be exposed

By Varonis Salesforce is the lifeblood of many organizations. One of its most valuable assets-the data inside-is also its most vulnerable. With countless permission and configuration possibilities, it’s easy to leave valuable data exposed. That, coupled with the fact that most security organizations aren’t very familiar or involved with Salesforce’s administration, opens organizations up to massive risk. Here […]
Prepare for Battle in 2022: How hackers and the new world of work are shaping security models

By Atech The main challenge in 2022 is data loss prevention (DLP) and it’s clear to see already from vendors’ such as Microsoft’s compelling propositions for compliance solutions. We are moving towards detecting data loss in real time. As we understand more about the human element in breaches and develop smarter controls and human-like detection […]
Download your complimentary copy of the 2021 Gartner Market Guide for Email Security

By Tessian Big News! Tessian has been recognized as a Representative Integrated Cloud Email Security (ICES) Vendor in the 2021 Gartner Market Guide for Email Security. Learn more about the changing threat landscape, Gartner’s recommendations, and what sets Tessian apart. This report states that “Email continues to be a significant attack vector for both malware […]
Cloud applications put your data at risk — Here’s how to regain control

By Yaki Faitelson, Co-Founder and CEO of Varonis Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organisation safe from cyberattacks, they’re also a big, growing risk. Your data is in more places than ever before. It lives in sanctioned data stores on premises and in the cloud, in online collaboration […]
Is cryptojacking hurting your network performance?

By Anthony Chadd, Neustar With the global cryptocurrency market experiencing steady growth, cryptojacking attacks have exploded in popularity. These attacks look to embed cryptomining malware in the targeted network to hijack servers and steal processing power, diminishing the capabilities of IT resources. Cryptojacking attacks can be carried out in numerous ways, but watch these two […]
WEBINAR: The next generation of secure digital communications – Why now and why it matters
By Zivver Regulatory reforms, digital transformation, hybrid working… The business landscape continues to evolve and the need for secure and compliant digital communications solutions is higher than ever. The current state of communications security cannot keep pace. Join our webinar to get practical insights from our panel of industry leaders, security experts and end-users as […]
Is application isolation the future of endpoint security?

The endpoint is the new frontline in the battle against enterprise cyber-risk – considering the increasing volume and complexity of threats, and the growth of unmanaged endpoints during the pandemic, it’s no surprise that the vast majority (91%) of global IT decision-makers interviewed recently by HP now believe that endpoint security has become as important […]
The freedom to focus on what matters most

By Rapid7 Today’s cyber security cannot follow the old playbook designed for detecting and mitigating attacks. The push for digitisation across industries and sectors has expanded the threat surface exponentially. The latest spike in ransomware attacks, data breaches, IP theft, bear testimony to that. Things have changed and need to be revamped and redesigned, keeping […]