Enterprise Security

Identity and access management: 5 things to watch out for
CA Technologies said there were five key trends in security and identity and access management that will impact organisations and security professionals in 2015 as they compete in the application economy.
GST fears stalling IT spend in Malaysia: Barracuda Networks
Companies know that they need IT security, but putting purchases on hold Barracuda sees growth potential in web application security solutions
The advancing storm: Key strategies for cyber-defence
The global business environment leaves us increasingly exposed, attackers have become even more sophisticated, and the number of cybercrime incidents reported by businesses appears to be on the rise – yet most organisations are only defending against yesterday’s threats, writes Neil Meikle of PwC.
Sony Pictures hack the ‘perfect APT story,’ says ESET
The Sony Pictures Entertainment hack was an incident that one could only be described as the 'perfect Advanced Persistent Threat (APT) story,' according to Juraj Malcho, the chief research officer for ESET.
Security leaders admit to being outgunned by cybercriminals: IBM study
More than 80% of security leaders believe the challenge posed by external threats is on the rise, while 60% also agree their organisations are outgunned in the cyber-war, according to a study by IBM.
Careless employees the greatest mobile security threat: Check Point report
The greatest threat to mobile security resides within the organisation, with 87% of professionals in a survey calling out careless employees. Nearly two-thirds of the respondents believed that recent high-profile breaches of customer data were likely due to employee carelessness, according to Check Point Software Technologies Ltd.
Security risks hiding in encrypted traffic: Blue Coat
The growing use of HTTPS encryption to address privacy concerns over the Internet is creating perfect conditions for cybercriminals to hide malware inside encrypted transactions, even reducing the level of sophistication required for malware to avoid detection, according to Blue Coat Systems Inc.
CyberArk integrates privileged threat analytics with McAfee solution
CyberArk said it has integrated CyberArk Privileged Threat Analytics with McAfee Enterprise Security Manager (ESM).
No 1 security vulnerability is careless or unaware employees: EY survey
Careless or unaware employees has been cited as the No 1 vulnerability companies face when it comes to cyber-security, according to EY’s annual Global Information Security survey.
Accidental sharing by staff bigger threat to data loss: Kaspersky Lab
In a global survey of IT professionals, 27% of all businesses said they have lost sensitive business data due to internal IT threats in the past 12 months, according to Kaspersky Lab. For the first time since the company began tracking these incidents in 2011, accidental data sharing by staff now produces a greater amount of lost data than software vulnerabilities.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019