dcsimg

Why Data Classification is Important for Security

These days, organizations store vast amounts of data. In fact, 65% of companies are collecting too much data, and are unable to find the time or the resources to analyze it. Not surprisingly, 54% of organizations didn’t know where all of their sensitive data is located. If businesses are unable to identify exactly what data they have and how it is being used, how are they supposed to protect … [Read more...]

Perimeter 81 Completes a $10M Funding Round Led by Partner SonicWall to Add Unified Network Security Services

2019 was a banner year for Perimeter 81 as we introduced and launched the second version of our Zero Trust solution, Zero Trust Application Access. Additionally, we were selected by Gartner as a Cool Vendor in Network and Cyber-Physical Systems Security and named a Deloitte Technology Fast 500™ rankings for EMEA. As we are nearing … The post Perimeter 81 Completes a $10M Funding Round … [Read more...]

Which cyber security software should you invest in?

Software solutions are the simplest way for organisations to address many of their cyber security threats. All you need to do is pick out and purchase the right tools and away you go.  Unlike the other aspects of the cyber security triad – processes and people – there’s often no need to carefully curate solutions that work for your organisation. Instead, technological solutions can be bought off … [Read more...]

Is Cyber Insurance Worth the Cost?

Another way to ask this question is, “Do you like to gamble?” That’s usually what the decision to purchase any type of optional insurance comes down to. It’s no different for cyber insurance, which every size business needs to consider. … [Read more...]

Deepfakes and LinkedIn: malign interference campaigns

Deepfakes haven’t quite lost the power to surprise, but given their wholesale media saturation in the last year or so, there’s a sneaking suspicion in some quarters that they may have missed the bus. When people throw a fake Boris Johnson or Jeremy Corbyn online these days, the response seems to be fairly split between “Wow, that’s funny” and barely even amused. You may well be more likely … [Read more...]

What is Partition Management?

<p>Storage space is a mission-critical asset for businesses today. From traditional hard drives to solid-state drives, companies need to get their money’s worth out of their storage hardware. Read More … [Read more...]

How to Detect a Data Breach

If we look at some of the most high-profile data breaches of the last few years, you will be astonished at how long it took for the organization involved to detect. Companies as big and as well-equipped as Verifone, took 6 months to detect the data breach that first started in the middle of 2016. It took Forever 21 around 9 months to detect their data breach that started in … Read more The … [Read more...]

IT Governance certified training now available in Amsterdam

IT Governance Europe is delighted to announce the launch of our latest classroom training courses in Amsterdam.   Starting in 2020, they offer attendees a structured learning path from foundation to advanced level, and enable IT, privacy and security practitioners to develop the skills needed to deliver best practice and compliance in organisations of all sizes.   Continual professional … [Read more...]

Exploit kits: fall 2019 review

Despite a slim browser market share, Internet Explorer is still being exploited in fall 2019 in a number of drive-by download campaigns. Perhaps even more surprising, we’re seeing new exploit kits emerge. Based on our telemetry, these drive-bys are happening worldwide (with the exception of a few that are geo-targeted) and are fueled by malvertising most often found on adult … [Read more...]