Category Archives: Hardware/Network

How AI Can Tame and Control Shadow IT in the Enterprise

‘Shadow IT’, usually described as “information-technology systems and solutions built and used inside organizations without explicit organizational approval”, offers cyber-criminals an easy entry point into corporate systems and is now

The post How AI Can Tame and Control Shadow IT in the Enterprise appeared first on The Cyber Security Place.

Persistent DDoS Attacks Evolve at Internet Scale

Attackers are harnessing the power of the internet, leveraging the proliferation of devices in the ever-expanding internet of things (IoT) to launch terabit-per-second–scale distributed denial-of-service (DDoS) attacks, according to NETSCOUT’s 2018 Threat Intelligence

The post Persistent DDoS Attacks Evolve at Internet Scale appeared first on The Cyber Security Place.

Could AI be the ‘silver bullet’ to cybersecurity?

Three quarters of IT decision makers believe AI and ML are the silver bullet to cybersecurity challenges. New research from the cybersecurity firm ESET has revealed that the recent hype surrounding AI

The post Could AI be the ‘silver bullet’ to cybersecurity? appeared first on The Cyber Security Place.

Untangle Survey Finds SMBs Rank Network Security as Top IT Concern

Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today released the results of their first annual SMB IT Security Report. The findings explore IT security apprehensions for small and

The post Untangle Survey Finds SMBs Rank Network Security as Top IT Concern appeared first on The Cyber Security Place.

Three essential pillars of transparent data security

Is your organisation prepared to handle and secure data across a diverse range of device types? Data security practices that disrupt workflow place an undue burden on users and administrators.

The post Three essential pillars of transparent data security appeared first on The Cyber Security Place.

Spam Click Rates High, 2FA Use Low at Work

Organizations continue to be at risk from insider threats because they lack strong identity management solutions, whether it’s end users clicking on spam, issues with multifactor authentication (MFA), or companies keeping their

The post Spam Click Rates High, 2FA Use Low at Work appeared first on The Cyber Security Place.

Cybersecurity & Business: Not Just an IT Problem

Connected technology, Internet-enabled (IoT) devices and other digital services each come with their own security risks. But when used in concert with businesses and their data, these technologies can present

The post Cybersecurity & Business: Not Just an IT Problem appeared first on The Cyber Security Place.

US Warns of Supply Chain Attacks

The US government has repeated warnings of state-sponsored cyber-attacks made possible by infiltrating the software supply chain. The report from the National Counterintelligence and Security Center (NCSC) reveals insight into foreign economic

The post US Warns of Supply Chain Attacks appeared first on The Cyber Security Place.

Why You Should Protect Your Business Network Above All Else

By Tiffany Rowe – Content Creator at Seek Visibility, Yes, your computers and servers are where your data is saved; yes, mobile and IoT devices sure are vulnerable; but your

The post Why You Should Protect Your Business Network Above All Else appeared first on The Cyber Security Place.

Overcoming the Siloed Network Security Challenge

Today’s threats are designed to target multiple attack vectors, expose vulnerabilities, select a compromise from an updatable toolkit of exploits, burrow deep into the network, and then hide their tracks.

The post Overcoming the Siloed Network Security Challenge appeared first on The Cyber Security Place.

Two-Fifths of IT Leaders regard IoT Security as Afterthought

IT leaders could be dangerously underestimating the security risks posed by IoT, according to new research from Trend Micro. The security vendor polled 1150 IT and security decision-makers in the UK,

The post Two-Fifths of IT Leaders regard IoT Security as Afterthought appeared first on The Cyber Security Place.

Businesses aren’t prepared for IoT attacks

Many lack awareness although the number of IoT attacks is rising.Businesses think an IoT-related cyber-attack would have them lose customers. So, what do they do to prepare for such an event?

The post Businesses aren’t prepared for IoT attacks appeared first on The Cyber Security Place.

What Tesla’s Spygate Teaches Us About Insider Threats

The saga involving a malicious insider at Tesla keeps getting stranger. Already there have been several fascinating twists and turns, well-chronicled in the press and on social media. Whatever the truth is,

The post What Tesla’s Spygate Teaches Us About Insider Threats appeared first on The Cyber Security Place.

Focus on security and standards to reap IoT rewards

Organisations are now investing billions in the Internet of Things (IoT) to create business efficiencies and improve productivity. Gartner claims that over a third (37 per cent) of the 8.4

The post Focus on security and standards to reap IoT rewards appeared first on The Cyber Security Place.

Five network security threats facing retail – and how to fight them

Digital networks are now the backbone of every retail operation. But they are also a very attractive target for cyber criminals. Paul Leybourne of Vodat International examines the key cyber

The post Five network security threats facing retail – and how to fight them appeared first on The Cyber Security Place.

Shrouding IoT Security in the Fog

The world is undergoing the most dramatic overhaul of our information service infrastructure ever, driven by the “connected everything” movement.While the benefits of connected data are indisputable – better decisions

The post Shrouding IoT Security in the Fog appeared first on The Cyber Security Place.

Protecting a Mobile Workforce with Hybrid DNS Security

It is expected that half of the UK’s workforce will be working remotely by 2020, accessing the corporate network via mobile devices and the cloud. If true, this prediction is likely to

The post Protecting a Mobile Workforce with Hybrid DNS Security appeared first on The Cyber Security Place.

To Grow The Internet Of Things, Improve Security

The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices.Research by Bain & Company finds that

The post To Grow The Internet Of Things, Improve Security appeared first on The Cyber Security Place.

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. Just when we thought we were

The post Staying secure as the IoT tsunami hits appeared first on The Cyber Security Place.

Is a UTM Appliance the Right Security Solution for Your Business?

A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. UTM appliances provide an

The post Is a UTM Appliance the Right Security Solution for Your Business? appeared first on The Cyber Security Place.

What is the Tor Browser? How it works and how it can help you protect your identity online

Move over “dark web,” the Tor Browser will keep you safe from snoops. The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it

The post What is the Tor Browser? How it works and how it can help you protect your identity online appeared first on The Cyber Security Place.