NHS 11 attack: What we learned
Friday, August 19, 2022 by Freeman Lightner
Databarracks provides secure Disaster Recovery, Backup, and Business Continuity solutions in the UK. Chris Butler is the Head of Databarracks' Resilience and Continuity Consulting practice, a fellow of the Institute for Leadership and Management, a Member of the Business Continuity Institute, and a Certified Information Security Manager. But...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
Elastic Stack 7.3 brings maps and more
Monday, August 5, 2019 by Christian Hargrave
Elastic has delivered Elastic Stack 7.3, which includes some very cool new features such as data frames, anomaly detection, elastic maps, and more. Check out all the highlights of the latest release below.
Elastic Stack 7.3 highlights
Data frames: a new feature that allows users to pivot their Elasticsearch data on the fly to create live entity-centric in...
Zero latency apps gets closer to reality thanks to Redis Labs
Tuesday, November 20, 2018 by Richard Harris
Complex technologies like a self-driving car take in huge amounts of data from its environment, processing it and make appropriate decisions on how to respond within a few milliseconds. This is the kind of zero latency future Redis Labs is enabling, and they announced at Redis Day London, the latest release of Redis Enterprise with two key functionalities: Red...
IoT medical devices aren't as secure as you think
Monday, November 5, 2018 by Richard Harris
Zingbox released the report of its second annual Healthcare Security Survey. The survey was expanded this year to include not only IT/IS professionals, but also clinical and biomedical engineers who play critical roles in managing and securing connected medical devices.
The survey revealed a contradiction between the confidence that healthcare professionals have in t...
What American companies can learn from Europe's new GDPR laws
Wednesday, June 13, 2018 by Christian Hargrave
People around the world have recently started to receive tons of emails from companies updating their privacy policies. Naturally, many ask, why this is happening, and the ones with a deeper understanding of the process mutter a four-letter combination - GDPR. While an astounding part of the US Senate appears to be confused about the concept of Net Neutrality, Europe&rs...
NVIDIA urges congressional committee to embrace AI
Thursday, February 22, 2018 by Richard Harris
Artificial intelligence represents the biggest technological and economic shift in our lifetime, NVIDIA’s Ian Buck told a U.S. Congressional committee recently. In testimony before a hearing of the House of Representatives Subcommittee on Information Technology, Buck, vice president and general manager of our Tesla business, said the federal government should increase r...
Many fintech DevOps are not enforcing security
Tuesday, June 6, 2017 by Christian Hargrave
Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Christian Hargrave
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
IT Governance of Sensitive Files on Corporate and BYOD Mobile Devices
Monday, June 20, 2016 by Jeff Steuart
Mobile content has brought new agility and efficiency to just about every enterprise. "Mobile communication and collaboration is accelerating and improving enterprise productivity and growth like no other universal technology since the dawn of the Web 25 years ago,” says Josh Bohls, Founder, Inkscreen. But these advantages come at a cost.Says Bohls, “Ask any o...
What You Need to Know about BYOD Security
Wednesday, December 2, 2015 by Jayaraman Gopal
As employees bring their own devices to work, IT teams face an assortment of challenges, from managing mobile apps on a myriad of different devices to backing up and restoring business data. But bar none, the greatest burden for IT staff is securing business data on mobile devices.The Good, the Bad, and the Ugly (in Reverse Order)The UglyThe BYOD phenomenon has spawned ...
An Analysis of the Starbucks Cyber Attack and How To Stay Protected
Wednesday, June 10, 2015 by Amit Ashbel
How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...