Blog
10 things to remember when planning 2020 data security
December 20, 2019
0 Comment
By Jan Van Vliet
2019 has seen a string of high profile, public cyberattacks. And as many organisations have found, data breach can be costly. For example, in July Capital One’s insider attack cost an estimated $300 million+. Also in July the ICO proposed a record fine costing upwards of £183 million to British
Rapid Cloud Adoption Introduces Security Risks
December 20, 2019
0 Comment
By Lior Cohen
Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that relies on an assortment of cloud platforms and services—especially when they all take different approaches to security and
How to Completely Secure Your Samsung Mobile Device
December 20, 2019
0 Comment
By SM Picks
Samsung mobile devices need to be protected against the many cyber security threats that exist today. These Android-based smartphones and tablets can be compromised in several ways, whether through malicious action on the part of hackers or unintentional consequences due to user error. This guide provides a comprehensive list of
Why 5G harbors multiple security weaknesses
December 19, 2019
0 Comment
By Lance Whitney
5G is being touted by many as the latest and greatest wireless technology with faster speeds and lower latency than its predecessors and the ability to juggle multiple devices, including Internet of Things (IoT) hardware and other demanding items. But concerns have arisen in some circles, including the European Union,
5 security operations and analytics trends to watch in 2020
December 19, 2019
0 Comment
By Jon Oltsik
According to ESG research, 36% of organizations are actively integrating disparate security analytics and operations tools in pursuit of a more cohesive security technology architecture (note: I am an ESG employee). Another 48% of organizations say they are somewhat active with security analytics and operations tool integration. This data describes