Taking a Cognitive Approach to Unified Endpoint Management

Read why Wes Gyure and John Harrington Jr. say that companies should take a cognitive approach to unified Endpoint management on Security Intelligence : If you function like most IT organizations, you’ve spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out […]

How AI Can Help Fight Healthcare Ransomware Threats

Healthcare is facing more ransomware threats every day, and is a prime target for such attacks. However, the Institute for Critical Infrastructure Technology (ICIT) explained in a recent paper that artificial intelligence could greatly aid organizations in creating stronger cybersecurity defenses. Read why Institute for Critical Infrastructure Technology (ICIT) research says that artificial intelligence can help […]

Automate DevOps so you can focus on a security-first culture

Read why Ben Taylor says that companies should automate their DevOps so that they can focus on security-first culture on Computer Business Review : Amid all the fanfare hailing the benefits of DevOps it is clear the movement to change how IT departments build, deploy and run applications is gaining momentum. CA Technologies suggests 81% […]

Why Your Enterprise Security Strategy Needs to Evolve

Read why Scott Koegler says that every organisation needs a security strategy to evolve on Security Intelligence : Creating a defensive and protective strategy is one of the core responsibilities for a security leader, but this is a tall order for any professional. That’s because security measures need to evolve as threats change over time. A static […]

11 Cyber-Security Predictions for 2017

A new forecast predicts that automated malware attacks will have a devastating effect on the internet of things (IoT). It also predicts the rise of the Shadownet (IoT botnets that can’t be seen or measured using conventional tools), cloud poisoning, more growth of Ransomware as a Service, and attacks on smart buildings Read/see the slide […]

Hackers can cause big problems for small businesses

Read why Martin DeAngelis says that hackers cause big problems for small and medium businesses on Press of Atlantic City : For a week or so in January, a well-known Atlantic City business was one of millions around the U.S. trying hard to stay on good terms with its customers. But anyone connecting on Facebook with the […]

Get ready for 2018’s changes to data protection laws

Read Stephen Foster explain how businesses can get ready for the new EU’s General Data Protection Regulation (GDPR) which kicks in from next year on Cipd Blog : Despite Brexit, the UK government has indicated that it will implement the EU’s General Data Protection Regulation (GDPR), which will apply from 25 May 2018. Read his full article […]

Almost half of UK business has NO cyber security plan

Almost half of UK businesses do not have a formal cyber security strategy implemented, despite the perilous nature of the current threat landscape. Read more about the new  IoD report titled Cyber security: Ensuring business is ready for the 21st century which reveals that only 57 percent of United Kingdom businesses have a cyber security […]

Smart Forensics for the Internet of Things (IoT)

Read Usama Salama explain the smart forensics for the Internet of Things on Security Intelligence : Interconnecting smart devices open companies, government agencies and individual consumers to a whole new world of useful applications. But while the Internet of Things (IoT) makes our day-to-day lives more convenient and dynamic, it also creates more opportunities for […]

OUR VIEW: Proactive approach needed in cybersecurity

It’s sad, but shouldn’t be surprising, that criminals seeking gain without exertion would focus on the most vulnerable targets. That apparently has happened in the latest major data breach, which has directly impacted Alabama (and probably local) residents. Read why businesses need a proactive approach to cyber security on The Gadsden Times,