What you need to know about securing access to your private cloud

Moving enterprise apps to the cloud is becoming a very attractive option for organisations striving to cut IT costs while improving agility and scalability. However, before making this move there is a lot to consider - What applications are you going to move? Are you planning to move them to Amazon Web Services™ (AWS), Microsoft® Azure or Google Cloud? How are you going to secure applications in the cloud?

2015: The Year of Securing Big Data and Cloud Environments

2015 will mark a pivotal year in the adoption of Big Data and Cloud within the enterprise. Critical to embracing this approach will be securing data in these environments. Questions such as access by 3rd party cloud providers to your data and the sharing of sensitive information within Big Data environments, need to be effectively addressed.

Using client reputation to intelligently defend your web applications

A Web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. This intelligence allows organisations to forecast intent and protect applications against Distributed Denial of Service and application layer attacks.


Mitigating employee risk - keep hires from starting fires

Employees are an organisation's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data. Finding the balance between trust and scrutiny/control represents a tremendous challenge and a huge opportunity if executed correctly. Most organisations use intense pre-hire screening background checks to ensure they are bringing in valuable talent that will benefit the organisation without the propensity to do harm. Once the employee is hired they are given the "keys to the castle" to do great things for their new employer....or they could cause great damage.

Managing Risk and Protecting Information Assets: Experiences from the UK Public Sector and Healthcare Industry

While IT professionals in the UK across industries face critical security issues around privacy of sensitive customer information, BYOD and network access, those in the public sector and healthcare industries need to comply to mandatory security regulations.

WordPress Security Simplified — Six Easy Steps For a More Secure Website

WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation. Like marketers, hackers are also aware of this prolific trend, frequently targeting WordPress vulnerabilities to attack websites en masse—often using automated tools.

How to Securely Move to the Digital by Default Services Standard - Are You Prepared?

UK Government is driving more and more of their critical transactional businesses online. This transition to a digital by default methodology is fraught with challenges and risks which are often not clearly understood.

Prepare for the Breach: Detect, Respond and Disrupt at the Moment of Compromise

Many organizations over invest in network security solutions—relying on traditional antivirus to secure their endpoints. Enterprises need to prepare for the inevitability of compromise by deploying emerging endpoint threat detection and response solutions to accelerate threat discovery, respond in seconds and intervene with on-going attacks.

Sign up to our newsletters