Knowledge is power. Nowhere is this frequently over-used expression more relevant than in the information security industry. After all, how can security managers begin to plan effective cyber defences if they don’t fully understand the ever-evolving threat landscape? At the very least, they need to cast the net as wide as possible to take advantage of a broad range of industry expertise. Documents and articles from commercial vendors, non-profits, academics and others can certainly be a useful source of information. So can threat data generated from specific security tools and systems. But so can trade shows and industry events.
That’s why we’re bringing our popular APAC security conference CLOUDSEC to London for the first time. Held next week Thursday, 17th September, it’ll be a fantastic place to network with fellow IT professionals, share experience and best practice, and hear from a range of industry experts on the latest cyber security trends. Continue reading →
According to a new piece of research we conducted with First Base Technologies, the security features on some of the market’s most popular smartwatches have been found to be poor.
Our study, which revealed security flaws in all six of big brand smartwatches on the market, stress-tested devices on physical protection, data connections and information stored to provide definitive results on which ones pose the biggest risk to consumers. Continue reading →
Bring Your Own Device (BYOD) has for the past few years been both a cause of sleepless nights for security bosses and a major flash point between the business and IT. To that we can now add wearable technology – smart watches, fitness trackers, head-mounted displays and the like which threaten to leak corporate data and expand the enterprise risk surface even further. IT consumerisation took another hit this month when new research revealed that some of the most popular apps in the world have password brute force vulnerabilities, exposing as many as 600 million Android and iOS users.
Of course, when it comes to BYOD and consumerisation, threats affecting personal devices can present major risks to corporate security too. This is why we regard consumerisation as one of the key pillars of cyber security strategy. Continue reading →
The Internet of Things promises to transform the way we live and work. Billions of smart, internet-connected devices will make us more productive, happier and even healthier. But there are risks. For enterprise IT managers and employees alike, there’s a real danger that the commercial pressure to release to market IoT products and platforms will override all other considerations, leading to major privacy and security gaps.
Those concerns are no longer theoretical as a new piece of research showed last week. It should provide serious food for thought for IoT players, end users and IT bosses. Continue reading →