Expert analysis
Cloud security: Integrated global CDN with DDoS mitigation and WAF
Applications are becoming more accessible on the web across all industries including gaming, e-commerce, software, and media. This is great for reaching new customers around …
Defending the enterprise in an increasingly complex environment
Technology has transformed the way organisations work and its evolution is now faster than ever before. The promise of IT transformation presents many opportunities for …
Disrupting trust models: An evolution in the financial services sector
The way we interact with service providers – whether travel organisations, music suppliers or retailers – has changed to be almost unrecognisable from five years’ ago. From …
Best practice application security: Does it exist?
Unfortunately and unsurprisingly, website breaches have become an everyday occurrence. In fact, hacked websites have become so common that typically only the biggest data …
What’s the state of your software?
Cybercrime is felt by businesses up and down the country, with the Information Security Breaches Survey (ISBS) reporting that 81 per cent of large and 60 per cent of small …
User behavior analytics for security operations efficiency
So, you’ve been informed by the FBI, a business partner, or security consultant that they have spotted a bunch of your company’s employee records on the paste bin website. …
Sun Tzu 2.0: Is cyberwar the new warfare?
For better or worse, the multitude of networks that help keep our world interconnected is a much different place today than it was in the past. Paradoxically, the networks …
Automated threat management: No signature required
The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists …
Internet of Things: Bracing for the data flood
There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer …
Three steps to a successful cloud migration
People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use. This stockpile adds up, …
A data security guy’s musings on the OPM data breach train wreck
Despite all the media attention to breaches, there is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with …
Why cloud business continuity is critical for your organization
Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders. Many …