STUDY: Covid-19 technologies must be regulated to stop ‘big brother’ society
Technologies, such as track and trace apps, used to halt the spread of covid-19 have to be thoroughly examined and regulated before they are rolled out for wider adoption, to ensure they do not normalise a big-brother-like society post-covid-19. That’s according to research conducted by Jeremy Aroles, Assistant Professor in Organisation Studies at Durham University […]
Why endpoint security matters more than ever
The swiftly evolving threat landscape, combined with the huge increase in remote working, means that securing your organisation’s endpoints has never been more critical. Here, George Glass, Head of Threat Intelligence at Redscan, explains the importance of endpoint security and why detecting and responding to the latest threats demands greater endpoint visibility and specialist expertise… […]
Security IT Summit: Save the date!
The next Security IT Summit will take place virtually on March 10th & 11th – make sure you register to attend today! Still offering you the same benefits as the live event – we will bring together the industry’s leading buyers and suppliers together for business collaboration. Your bespoke place is entirely free and includes benefits such as; Prepare for every […]
Identity Access Management vs. Access Rights Management – What’s the Difference?
The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions. Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/ If you are […]
Meeting the Tests to get out of Data Lockdown
Digital transformation of any business has always been hampered by making sense of underlying data. And that data has been growing in volume at an unprecedented rate driven by the growth of IoT. It’s the perfect storm – the need for real-time information being increasingly distanced by the rate at which the data volume is […]
Power utilities ‘prioritising cybersecurity’ as threats grow
Power utilities have become more prone to cyberattacks amid the COVID-19 pandemic as attackers have strived to benefit from the rush to remote systems and undermanned facilities. Utilities need to comprehend the new cyber risks involved with home-based work such as social engineering attacks and less reliable internet connections in order to accordingly set up baseline defences and […]
Do you specialise in Anti Malware? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in November we’re focussing on Anti Malware solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Anti Malware solutions […]
Security IT Summit: Last remaining delegate places
We would like to invite you and a colleague to our virtual Security IT Summit, taking place Thursday 5th November. This one-day virtual event will allow you to meet with selected solution providers for 1-2-1 meetings, and gain access to live and pre-recorded industry webinars. To view our short virtual event tutorial video, please click here. Attendance […]
‘Massive’ rise in DDoS and password attacks during pandemic
New analysis from F5 Labs has discovered a massive rise in DDoS and password login attacks during the pandemic. In January, the number of all reported SIRT incidents was half the average reported in previous years. However, as lockdowns were put in place from March onwards, there was a sharp rise in incidents. The attacks can be […]
User Access Review – What’s That?
By Tenfold Security Users come, they stay, they leave, they move around between departments and they collect privileges on the way. That’s OK, they need privileges to do their jobs. But do they need all the privileges they have, always? That’s a question you need to ask yourself, for every user, repeatedly. This article covers what is meant by a user access […]