fbpx

Latest Security Opinions


Are we heading for a major cloud security storm?

Over the last five years, global cloud adoption has grown at an astonishing rate. To put this into context, a recent study by Bitglass into 2019 cloud adoption trends found that almost 90 percent of businesses have now deployed some sort of cloud-based infrastructure or tools to aid productivity and performance.

As more and more sensitive data enters the cloud, it’s critical that businesses invest in the necessary security tools in order to protect it. Unfortunately, this doesn’t appear to be the case. The same study found that only a third of the businesses who had adopted cloud solutions had implemented even the most basic cloud security tool; single sign-on (SSO).


New year, new habits? Why this CISO reckons you need to change your security behaviours

he question of trust in technology is more pressing than ever. However, software, websites and apps are still being produced which fail to provide comprehensive security. Why is this still happening?

“I believe that part of what my job is, is social responsibility” says Simon Legg, who last September took on the role of CISO at car insurer Hastings Direct. For Legg, it’s about educating people to make better security decisions. And he believes there’s one key reason that businesses and security teams are still making mistakes when it comes to security.

“I’m trying to drive us away from this culture of thinking about security in non-functional requirement terms, and always, always, always thinking about it in functional requirement terms.” For Legg, a recurring problem that businesses experience is that when building services, they divide software design into two buckets: functional and non-functional requirements.


CISO Interview: Does ‘breach normalisation’ have its benefits?

The topic of breach normalisation has been examined heavily before, but most of the discussion has centred around its obvious, negative effect – the desensitisation and numbing of society to each passing incident.

Tangible effects are rarely immediately apparent in the aftermath of a breach. News reports consequently lack visceral impact. It’s not immediately clear where data ends up — users are inclined to think there is a high chance that their data, representing one line in a tomb of a database, might never be deployed against them.

“I’ve actually had journalists tell me this in the past. They would actually say it’s difficult for us to talk about because we don’t have a picture or video or something we can frame it against to capture people’s attention.”

But Pinkard also says there are also positive effects to the phenomenon.


The Grinch bot that stole Christmas

We’ve all heard of the boogie man that steals children in the night-time. It’s been giving kids nightmares for years. Now, we have something that will give their parents a scare during the next few weeks. It’s the Grinch-bot and it’s quietly stealing presents in the build-up to Christmas.

During the golden quarter, the period encompassing Thanksgiving, Black Friday, Cyber Monday, Christmas and the New Year sales, the Grinch-= bot is proving to be a real party-pooper.


Black Friday: Why retailers should shop around for the best tech

Since bursting into the lives of UK shoppers in 2014, Black Friday has fast become the busiest week in the retail calendar. Cyber Monday is the online sister of Black Friday, and that too has ballooned in recent years. In fact, last year, a record-breaking $7.8 billion worth of sales were made on Cyber Monday.

With all this demand, comes greater responsibility. Luckily for those retailers looking to capitalise on this record-busting sales event, there are plenty of cutting edge technology solutions to help them get it right.

Techerati spoke with nine technology experts to get their thoughts and advice for retailer best practice this Black Friday and Cyber Monday.


The 5 weirdest hacks of all time

Cyber attacks come in all shapes and sizes When it comes to hacking, it’s easy to think of the many films which showcase the criminality of it. From 2016’s Snowden to 2007’s Die Hard 4, hacking is typically associated with thrillers and crime dramas – films which feature a master hacker able to unlock a… Read More


Why centralised connectivity is the most secure approach for businesses

Cloud computing has offered a wealth of opportunity for businesses across the globe. From encouraging vast and continuous development of services, applications and platforms, to giving companies a myriad of choices when it comes to finding the right solution to drive business benefit. However, cloud computing does open the door to new risks that need to be acknowledged. These risk factors come in many different shapes and sizes, including unauthorised system access, mass data loss, or the complexity of network identity management.  

Visibility is absolutely key for businesses to make informed and educated decisions. Without the full picture, correct decision making is nearly impossible and will ultimately lead to failure. With an understanding of where the risks and threats lie, companies can build a defence to mitigate these threats; this is where having centralised connectivity is essential. 


Are you at risk from data manipulation attacks?

A common assumption about cyber attacks is that they’re all about theft. But that’s not always the case, as data manipulation attacks illustrate. This type of attack is where cyber criminals access the target system and make undetected changes to data in order to elicit some form of gain, but without any outright theft taking place. Sometimes referred to as “the hack you might not notice”, they have the potential to cause immense damage. 


Do smartwatches pose a cyber security risk?

How long until a compromised smartwatch brings down a company’s cyber defences? According to cyber security expert Chester Avey, the clock is ticking.


Cyber Security Awareness Month: With more risk, comes greater responsibility

Cybercrime is getting smarter and data is growing in value. So, as cyber-attacks become more sophisticated, businesses need to rise to the challenge and protect their digital operations. This October is National Cybersecurity Awareness Month, which aims to draw attention to the threats that are putting businesses, and individuals, at risk. To highlight the importance of this awareness month, Techerati spoke with seven industry experts to get their thoughts and advice.


TechWeek 2019: How to ensure your smartphone and its data are not weaponised

Over the past few years, cyber security specialist Frank Satterwhite has been working with a talented group of cyber engineers to create and package a security platform that allows users to protect their data in cyberspace. One of the group’s key focuses is on increasing mobile cyber hygiene as smartphones become the default device for most digital tasks at home and, increasingly, in the workplace.

Smartphones have become the central tool of our daily digital lives, whether for facilitating quick communication with friends and family, browsing social media or keeping up to date with the latest news.  But from a cyber security perspective, mobile devices present easy targets for hackers seeking to compromise personal data. 


Securing Slack: Is your organisation protected?

In a few short years, Slack has transformed from a relatively unknown cloud application into one of the most popular team collaboration solutions in the world. For many enterprises, Slack is initially used in small, unsanctioned (shadow IT) deployments amongst internal workgroups. From there, use of the app typically balloons so quickly that it simply cannot be ignored. Today, Slack boasts over 10 million daily active users and more than 85,000 paying customers worldwide.



Do NOT follow this link or you will be banned from the site!