ChannelLife UK - Industry insider news for technology resellers

Opinion stories - Page 127

Roi abutbul   from raw data to actionable intelligence the art and science of endpoint security

From raw data to actionable intelligence: The art and science of endpoint security

Fri, 28th Apr 2017
#
ai security
#
ai
#
microsoft
The endpoint is vulnerable. That's where many enterprise cyber breaches begin: An employee clicks on a phishing link and installs malware.
Thinkstockphotos 491324833

Young cybercriminals 'more motivated by peer respect than financial gain'

Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Thinkstockphotos 512691636

Carbon Black asks: So what exactly is threat hunting?

Wed, 26th Apr 2017
#
malware
#
semiconductors
#
cybersecurity
​Information security professionals used to put all of their chips towards incident prevention. This didn't work out very well.
Thinkstockphotos 642442154

Women in cybersecurity: Slowly but surely, change is coming

Mon, 24th Apr 2017
#
malware
#
cybersecurity
#
opinion
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Thinkstockphotos 475507032

Why stakeholder collaboration is key to your cloud success

Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Thinkstockphotos 510691579

Around 17 million websites are already powered by WordPress - are they secure?

Thu, 20th Apr 2017
#
mfa
#
iam
#
cybersecurity
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Gettyimages 586936882

Making design thinking an 'always-on activity'

Wed, 12th Apr 2017
#
martech
#
assurity
#
opinion
When operated as a continuous routine process with your customers, design learning cycles will help inform your fundamental business strategy.
Thinkstockphotos 469918032

Strategy for cyber crime: own the routers, own the Internet

Mon, 10th Apr 2017
#
router
#
carbon black
#
opinion
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.
Thinkstockphotos 478338933

It's time to finally say goodbye to Windows XP. And Vista. Again.

Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Thinkstockphotos 655596958

Don't pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Wed, 5th Apr 2017
#
malware
#
martech
#
cybersecurity
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Thinkstockphotos 613552492

Diversity & inclusion has to be woven into business DNA

Mon, 3rd Apr 2017
#
hcm
#
dna
#
payroll systems
The point is to establish data-driven decision making on a daily basis for hiring, promotion, development, rewards and teamwork.
Thinkstockphotos 101359429

Malware campaign targets open source developers on GitHub

Fri, 31st Mar 2017
#
malware
#
martech
#
apm
Be on your guard if you're a developer who uses GitHub – someone could be trying to infect your computer with malware.
Thinkstockphotos 522854602

ICIT: The Know Your Enemies 3.0 Advanced Persistent Threat Advisory is finally here

Wed, 29th Mar 2017
#
malware
#
advanced persistent threat protection
#
cybersecurity
China and Russia are by far the most active and they sponsor the most prevalent and the most sophisticated adversaries.
Thinkstockphotos 486791090

The economics of cybersecurity for the undecided

Mon, 27th Mar 2017
#
malware
#
ddos
#
phishing
It is precisely because of this concept of the cost of doing nothing that we're able to determine the value of a cybersecurity solution.
Thinkstockphotos 624569000

The business case for storage simplicity

Mon, 27th Mar 2017
#
storage
#
converged infrastructure
#
healthtech
Revolutionising IT: Firms push for simple storage systems to fuel business efficiency and slash costs in the digital cloud era.
2fc44cae6ba0caff448d00b096249c8a

Moving towards DevSecOps to save time and money

Thu, 23rd Mar 2017
#
devops
#
application security
#
devsecops
The big development project is almost ready to go live, inside the deadline. Just your security review to go. What happens next?.
Thinkstockphotos 461241553 1

Enterprise file sync and share comes of age

Mon, 20th Mar 2017
#
ovum
#
file sharing
#
opinion
The workforce needs to access all relevant documents, files, and information via any screen, from any location, at any time.
Thinkstockphotos 94035108

Identity theft - have you ever pen tested procedures?

Mon, 20th Mar 2017
#
devops
#
mfa
#
iam
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.