TechDay UK - The United Kingdom's technology news network

Cybersecurity strategy stories - Page 5

Story image
Security professionals want to return fire – Venafi
Wed, 20th Mar 2019
#
devops
#
apm
#
software development
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Story image
How business leaders must prioritise cyber risk - Palo Alto Networks
Wed, 13th Mar 2019
#
firewalls
#
network infrastructure
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Story image
Flashpoint: Contextual data key to effective security
Mon, 4th Feb 2019
#
data analytics
#
martech
#
planning
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Story image
LogRhythm: Foster a culture of cybersecurity awareness
Fri, 1st Feb 2019
#
siem
#
wireless networks
#
cloud services
Fostering a culture of cybersecurity awareness is essential for Australian companies facing escalating cyber threats. Here's how to build it.
Story image
Achieving cyber resilience in the telco industry - Accenture
Mon, 21st Jan 2019
#
uc
#
ddos
#
devops
With hacking attempts surging, Singtel, SoftBank, Etisalat, and Telefónica have formed the Global Telco Security Alliance to bolster global cybersecurity.
Story image
Implementing shared security models in the cloud
Tue, 8th Jan 2019
#
firewalls
#
cloud security
#
application security
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.
Story image
How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
passwords
#
cybersecurity strategy
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Story image
Govt announces cybersecurity grants for SMBs
Mon, 3rd Dec 2018
#
smb
#
grants
#
australian government
The Australian Government introduces a $10M cybersecurity initiative, offering grants to SMBs and boosting CREST ANZ's capacity to enhance digital security.
Story image
How to configure your firewall for maximum effectiveness
Wed, 14th Nov 2018
#
manageengine
#
cybersecurity strategy
#
retail
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Story image
Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Story image
Don’t let your network outgrow your IT team
Thu, 8th Nov 2018
#
network infrastructure
#
sdn
#
naas
Growing complexity in business networks can overwhelm IT teams. Pruning back complexity and increasing visibility can help IT teams stay in control.
Story image
Combatting the rise of Cybercrime-as-a-Service
Wed, 7th Nov 2018
#
malware
#
breach prevention
#
wireless networks
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Story image
Securing your cloud data: Point solutions vs single pane of glass
Mon, 5th Nov 2018
#
cloud security
#
casb
#
unified threat management
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
Story image
The key pillars of strong cybersecurity strategies
Fri, 2nd Nov 2018
#
devops
#
multi-cloud
#
iam
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Story image
LogRhythm reports higher-than-anticipated SOAR adoption rate
Thu, 1st Nov 2018
#
siem
#
logrhythm
#
cybersecurity strategy
LogRhythm sees a significant surge as 33% of customers adopt its SOAR capabilities, outpacing Gartner's 2018 SOAR adoption estimates.
Story image
More OT devices added to Tenable's industrial security offering
Fri, 19th Oct 2018
#
tenable network security
#
cybersecurity strategy
#
security week
Tenable has expanded its asset discovery and vulnerability management solution to include thousands of new OT devices, enhancing industrial security.
Story image

GDPR compliance: Looking beyond the hype
Wed, 17th Oct 2018
#
data protection
#
data privacy
#
rubrik
Six months post-GDPR, we demystify compliance myths and provide key insights to navigate the data regulation maze.
Story image
Exclusive: Cybersecurity in the API economy
Mon, 15th Oct 2018
#
risk & compliance
#
okta
#
api management
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Story image
Trend Micro’s four pillars of cybersecurity strategy
Thu, 11th Oct 2018
#
cloud security
#
risk & compliance
#
ai
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Story image
Industrial control systems: How to approach OT cybersecurity
Tue, 9th Oct 2018
#
risk & compliance
#
cybersecurity strategy
#
pas global
To secure facilities, operational technology and IT security must come together. PAS Global spoke to industry experts for their strategies.