Blog
By Ben Watford
An arms race — unseen, digital and all too little understood — is raging. The UK’s chief of the defence staff, Nick Carter, recently stated that “the risk of cyber warfare with Russia is now a greater threat than terrorism”. Companies are fighting to adapt to a reality where “hacktivists”,
4 fundamental microservices security best practices
February 27, 2020
0 Comment
By Joydip Kanjilal
Microservices architecture promises faster time to market, better scalability and loosely coupled components compared to monolithic builds. However, a conglomeration of several small autonomous services comes at a security cost — it complicates service-to-service communication, fragments data consistency and increases attack surfaces. When you are working in a microservices-based application,
By Jessica Davis
Verizon’s 2020 Mobile Security Index shows two-fifths of healthcare organizations faced a mobile device compromise last year, with some admitting they sacrifice security “to get the job done,” thus increasing risk. Verizon recently released its third annual Mobile Security Index, which revealed 37 percent of healthcare organizations admit to sacrificing
The Three Best Practices for Securing the Hybrid Cloud
February 25, 2020
0 Comment
By Ashley Halsey
When it comes to cloud infrastructure and implementation, the hybrid cloud option is one that many companies are beginning to latch on to. Overall the most notable element of this realm of security is that it combines the flexibility and customization of a private cloud with the availability of the
Addressing the IoT security challenge
February 21, 2020
0 Comment
By Charaka Goonatilake
We consider how best to address some of the critical security challenges around the internet of things. Businesses are subject to a number of critical market forces that are changing how they need to execute their cyber programmes. One of the biggest is that internet of things (IoT) technologies are