Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
The holiday season in 2016 will see many of these large enterprises up their game in terms of protecting customer data. It’s not as if they have much choice, data breaches in the past have reduced public trust in online retailers – but the latest approaches to ensuring data security go some way to restoring that trust.
In this second part of a two part series we will be taking a look at how online retailers are taking steps to mitigate against the almost inevitable threat to data from hackers that seems part and parcel of the holiday buying season.
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President Donald Trump who is still using a legacy Android device. In this article we examine just why mobile devices present massive challenges when it comes to data security – and why business users need to be vigilant.
What some are calling ‘Industrie 4.0’ or the Smart Factory has become a reality, and has accelerated the digital transformation in the industrial sector. This increased reliance on digital systems has led to an increased emphasis on industrial control systems (ICS) security in the manufacturing sector.
ATM machines have always represented a “soft target” in the minds of criminals. What’s now clear is that the ATM card skimmer scams of years past pale in comparison with what’s possible now with jackpotting scams with cyber criminals turning every ATM they visit into casino slot machines with huge jackpots.
New report shows nearly 75 percent of U.S. federal agencies are still woefully unprepared and deemed to be “at risk” or “at high risk” of a cyber attack.
Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos.
With autonomous vehicles gaining mainstream attention, the challenges that come with the tech are being scrutinized. The biggest of these is the threat of hacking.