Cloud security
Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : Cloud security
-
December 09, 2020
09
Dec'20
There’s no going back to pre-pandemic security approaches
The cyber security world will probably never return to its pre-pandemic state, and different approaches to security will come to the fore in 2021
-
December 09, 2020
09
Dec'20
Top IT predictions in APAC in 2021
The Asia-Pacific region will continue to be a cradle for technology innovation in the new year, whether it is 5G services, artificial intelligence, cloud computing or cyber security
-
December 08, 2020
08
Dec'20
Russian state actors exploiting VMware bug to hijack data, users warned
Russian APT groups are actively exploiting a vulnerability in VMware products to access protected data, according to latest warnings
-
December 04, 2020
04
Dec'20
Avast and Borsetta to support Intel’s AI security project
Security firm Avast and AI security specialist Borsetta have signed up to support an Intel-led artificial intelligence security research project
In Depth : Cloud security
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions of the risks and best practice for mitigation Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Compare AWS CloudEndure vs. Azure Site Recovery services
Learn how DRaaS heavyweights AWS CloudEndure and Microsoft Azure Site Recovery compare when it comes to architectures, features, integrations, pricing and other considerations. Continue Reading
Blog Posts : Cloud security
-
API, API, API, API (aye aye aye aye)
I very recently spoke at a webinar for a long-time client emanating from the artist formerly known as helpdesk market - Sunrise Software - on the increasing importance of APIs - usable ones, not ... Continue Reading
-
So – We Have The “New Normal” But Then IT Infrastructure’s Changing Anyway…
I was at an event in London at the beginning of the year – in the days when we were allowed to do that kind of thing – a platform migration event as it happens. One of the key takeaways from that ... Continue Reading
-
SASE And Cato; The Fit...
As promised in the previous blog, given the seeming importance of SASE, here’s more definition in terms of what briefings with Cato Networks revealed. If we look at the key areas where SASE and ... Continue Reading
Opinion : Cloud security
-
Security Think Tank: SOAR to the next level with automation
SIEM and SOAR have much in common, but there are key differences between the two that may influence the best fit for your organisation. What should security pros consider when making a choice? Continue Reading
-
SIEM or SOAR or both? Consider your business complexity first
SIEM and SOAR have much in common, but there are key differences between the two that may influence the best fit for your organisation. What should security pros consider when making a choice? Continue Reading
-
Security Think Tank: Adapting defences to evolving ransomware and cyber crime
The threat of identity theft via a data breach is heightened with the rise of attacks where ransomware threat actors both encrypt and ransom, and exfiltrate and leak their victims’ data. How does this evolution in cyber crime heighten risk for the enterprise, and what steps can we take to safeguard the personal data we hold? Continue Reading
Videos : Cloud security
-
How Zoom is keeping pace with demand for conferencing tools
Magnus Falk, CIO advisor at Zoom, offers insights on how the company is scaling up its resources to meet the growing usage of its service
-
CW500 Interview: Jonathan Moreira, CTO of PrimaryBid.com
In this CW500 video, Jonathan Moreira, CTO of PrimaryBid.com, gives a fintech startup’s perspective on the security challenges small businesses can face when adopting new technologies.
-
CW500 Interview: Paddy Francis, CTO, Airbus CyberSecurity
In this CW500 video, Paddy Francis, CTO, Airbus CyberSecurity shares his advice and experiences of keeping tabs on security when trying to introduce emerging digital technologies into large organisations.
