Skip to content

Posts Tagged ‘cyber security’

The Seven Pitfalls of Privilege

Privilege

Michael Byrnes, director – solutions engineering, iMEA, BeyondTrust, explains the 7 pitfalls of privilege, and how cybersecurity teams can avoid them When the region was hit by COVID-19, organizations prioritized business continuity in their movements to the cloud. But ironically, the very continuity they had in mind was compromised by the haste with which it was…

Read More

HFW and CyberOwl join forces to help shipping industry manage cyber risk

cyberowl

Global, sector-focused law firm HFW and maritime cyber security company CyberOwl have joined forces to provide comprehensive technology and legal services to the shipping industry around cyber risk management and compliance. HFW’s market-leading shipping lawyers and CyberOwl’s team of data and security experts will work together to help the maritime sector prevent and actively defend against commercial, legal, technical…

Read More

Mimecast threat intelligence report analyzes 99 billion rejected emails

emails

Mimecast, an email and data security company, today announced the availability of its quarterly Threat Intelligence Report: Risk and Resilience Insights. The report provides technical analysis from the Mimecast Threat Center from July -September 2019 on the nature of attack campaigns in addition to observations and analysis of evolving threats. Outlining the trends emerging from…

Read More

Cloud-based Access Control: Improving Security in More Ways Than One

Trevor Ball

Access control has always been at the forefront of building security. Traditionally, access control systems have come in the form of conventional lock and key methods, electronic systems or a combination of the two. Today, cloud-based systems are changing the market landscape, providing secondary security benefits to users across the UK. Trevor Ball, business development…

Read More

Idax Software puts the user experience first with launch of version 3

Idax Software

Idax Software has launched Version 3 (V3) of its identity analytics platform. V3 prioritises the user experience with an intuitive and interactive user interface, putting it at the forefront of cyber-security. Idax’s platform analyses what data and files your staff have access to, and tells you which access rights they shouldn’t have. Insider threat is…

Read More

Osirium Technologies provides its trading update ahead of its final results

Osirium Technologies

Osirium Technologies provides the following trading update ahead of the Group’s final results for the year ended 31 December 2018. Trading has continued to improve year on year, as anticipated, and is in line with the Board’s expectations with booking levels expected to be significantly ahead of the prior period.  Revenue for the 12 months to…

Read More

Naval Dome introduces new dashboard for optimum cyber monitoring

Naval Dome

Naval Dome has come up with an innovative approach to managing the cyber security status of all protected systems onboard ships, allowing shipboard and shoreside staff to monitor and evaluate fleet-wide system data, even when they are offline. Until now, only crew members have been able to access a ship’s offline data sets. The Naval…

Read More

All I want for Christmas: A CISO’s wishlist

CISOs

As Christmas fast approaches, CISOs and cyber security experts around the world are busy putting plans in place for 2019 and reflecting on what could have been done differently this year. The high-profile data breaches have been no secret – from British Airways to Dixons Carphone to Ticketmaster and the introduction of GDPR in May…

Read More