Blog
Addressing the IoT security challenge
February 21, 2020
0 Comment
By Charaka Goonatilake
We consider how best to address some of the critical security challenges around the internet of things. Businesses are subject to a number of critical market forces that are changing how they need to execute their cyber programmes. One of the biggest is that internet of things (IoT) technologies are
Top 3 Considerations For Enterprise IoT Security
February 19, 2020
0 Comment
By Tom Stitt
Enterprise IoT, those connected devices you increasingly find on your organization’s network like printers, VoIP phones, smart boards and TVs inside your network, is growing at a massive rate and is expected to reach USD 58 billion by 2023. These devices represent an uncontrolled risk that the majority of organizations
Mobile security for enterprise is trending in cybersecurity
February 18, 2020
0 Comment
By Debasish Mukherjee
It is 2020 and Bring-Your-Own-Device is still trending. Every day, petabytes of information zoom through employee devices in an organization. And this will certainly not stop. According to Crystal Market Research, the global Bring-Your-Own-Device (BYOD) market will reach $318.41 billion by 2022. The report accredits this trend to the consumerization
How to make cyber security intelligence-driven for a more proactive cyber defence
February 18, 2020
0 Comment
By Nick Ismail
In this article, four experts explain how to make cyber security intelligence-driven and, in turn, create a more proactive cyber defence For to long, cyber security has been reactive — a panicked response to an inevitable breach. But, cyber security best practice is changing. The industry is moving from a reactive to a
10 Basic And Easy Cybersecurity Steps
February 18, 2020
0 Comment
By Michelle Drolet
Is cybersecurity a top priority for your business? We certainly hope so. A recent report revealed that almost 64% of all businesses prioritize IT security above everything else. Even 80% of all SMBs rank IT security as a top business priority. A successful cyberattack can damage your company beyond repair. This