Sounding The Alarm: Can Your Home Security System Be Hacked?

By Martin Hodgson, Head of UK and Ireland at Paessler A network is only as secure as the devices connected to it. With each connected device comes increased vulnerability. The modern household is no exception, with the recent explosion of IoT devices in the home creating a potential goldmine for hackers. Scarier still, many of these connected devices on home networks are dangerously unsecured. Even home alarm systems, designed to…

August 22, 2019
Read More >>

Alexa: How Secure Is My Smart Home?

By David Emm, Principal Security Researcher, Kaspersky Baby monitors, CCTV tools and smart home devices like Amazon Alexa and Google Home are all handy additions to today’s modern home. A quarter of Britons now own one or more smart home devices, and by 2023 every home in the UK is expected to contain at least 50 of them. It is therefore becoming increasingly important for consumers to consider the dangers…

August 22, 2019
Read More >>

UK FinTech CashFlows Continues Growth With Akamai In Face Of Increasing Cyberthreats.

Akamai (NASDAQ: AKAM), the intelligent edge platform for delivering and securing web experiences, today announced it is protecting CashFlows, an innovative FinTech offering comprehensive merchant services, alternative payments, and BIN Sponsorship solutions (card issuing and ATMs), from the growing threat of Distributed Denial of Service (DDoS) attacks against its cloud-based services. Founded in 2010, CashFlows was one of the first independent UK payments institutions accepted as a principal member of…

August 22, 2019
Read More >>

Over Two Thirds Of British Companies Feel Cybersecurity Concerns Prevent Them From Adopting New Technology.

Over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster, according to a new report from EY that is based on a survey of 175 C-suite executives at UK-based organisations. Cloud computing and the internet of things (IoT) were the two technologies that were perceived to pose the greatest cybersecurity risks. Mike Maddison, EMEIA Advisory Cybersecurity Leader, EY says:…

August 21, 2019
Read More >>

SOAR vs. Security Operations: What’s Really Going On?

Written by John Czupak, CEO, ThreatQuotient There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us are equally confused about the fundamental capabilities of these technologies, and more pointedly, what problems…

August 21, 2019
Read More >>

Machine Learning And The Future Of Security.

By Morgan Jay, Area Vice President at Imperva. We often question what drives the success behind enormous companies like Google and Amazon. A large part of the answer is machine learning. These companies have quickly adopted machine learning, finding smarter ways to apply it and changing the dynamic of how they work. With the extra analytical muscle that machine learning affords, they’re able to drive more intelligent and innovative projects…

August 20, 2019
Read More >>

Five Steps To Defending Against And Recovering From A Cyber Attack.

Given how commonplace cyber attacks have become on a global basis, the topic of cyber security is moving increasingly up the board agenda, and rightly so. 72% of large businesses in the UK said they had identified at least one cybersecurity breach in 12 months and 40% experienced a breach or attack at least once a month. Clearly, businesses are aware of the prevalence and potential damage that attacks can…

August 20, 2019
Read More >>

Is There Room For New MSSPs To Enter The Cyber Security Market?

Written by Bernard Parsons, CEO and Co-Founder, Becrypt While the MSSP model is far from new, and many well established MSSPs with comprehensive offerings exist, there seems to be no shortage of traditional Value-Added Resellers (VARs) still keen to transition to the model. There is still opportunity for these VARs, given the dynamic nature of the cyber security market. So, when we talk about an MSSP, what exactly do we…

August 20, 2019
Read More >>

Demystifying Data Subject Access Requests.

One year on from the introduction of the General Data Protection Regulation (GDPR) and it is becoming clear that when it comes to Data Subject Access Requests (DSAR), organisations are confused regarding a desire to balance the rights of an individual with the needs of an organisation, John Potts (Head of DPO DSAR and Breach Support) GRCI Law, outlines the essential processes that companies must put in place to avoid…

August 19, 2019
Read More >>

BlackBerry Again Positioned As A Leader In Gartner’s 2019 Magic Quadrant For Unified Endpoint Management Tools.

BlackBerry Limited (NYSE: BB; TSX: BB) today announced its position, for the fourth consecutive year, in the Leaders quadrant for unified endpoint management (UEM) and inclusion in the 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report by Gartner, Inc., the world’s leading research and advisory company. This Magic Quadrant evaluates the ability to execute, and completeness of vision, of vendors in the unified endpoint management (UEM) market. BlackBerry’s…

August 19, 2019
Read More >>