dcsimg

Less than half of businesses can detect IoT data breach

Only 48% of businesses have the infrastructure set up to detect whether their IoT infrastructure is open to a data breach, a report by security firm Gemalto has revealed. Firms are now asking for the government to intervene and set better regulations around IoT security to prevent potentially damaging hacks into such devices. In fact, 79% of the 950 decision makers the company spoke to said they … [Read more...]

Thycotic Ends 2018 with Record-Setting Quarter

Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced that it has ended a stellar 2018, outperforming 2017 with a 45 percent year-over-year sales growth. In addition to its sales growth, Thycotic also added 285 new customers in Q4 alone and 858 for 2018 overall. In addition to its on-premise enterprise-class PAM solution, … [Read more...]

Reduce malware dwell-time & the need to re-image infected endpoints!

According to research conducted by the Ponemon Institute, malicious or criminal data breaches take an average of 229 days to identify and 82 days to contain. The time required to remediate these incidents is substantial, often taking hours just to re-image a single endpoint. Lengthy dwell time and time-consuming re-imaging seem inevitable to an experienced IT team. Malwarebytes Incident Response … [Read more...]

What Does Your Corporate Brand Stand For?

Companies are extremely good at defining their product brands. Customers, employees, and other stakeholders know exactly what an iPhone is and means. But organizations are often less sure-footed when it comes to the corporate brand. What does the parent company’s name really stand for, and how is it perceived and leveraged in the marketplace and within the company itself? Read more … [Read more...]

How data science and machine learning are reshaping global industries

Data science and machine learning have already shown their potential in transforming businesses.This pace can be felt through the veins of those industries who are leveraging sensors, actuators, applications and various other resources to collect and crunch data. The real potential of data science and machine learning is categorised in the results of the critical decision making taken by leaders. … [Read more...]

What Countries and Companies Can Do When Trade and Cybersecurity Overlap

Cybersecurity as a key issue for trade policy is a relatively new development. In the last few years there have been a number of news reports about various governments’ incorporating spyware, malware, or similar programs into computer-based products that are exported around the world. The governments typically have worked with private companies in their countries to do it. In the … [Read more...]

Privacy and Cybersecurity Are Converging. Here’s Why That Matters for People and for Companies

2018 has been the year of privacy.  News of Facebook’s exposure of tens of millions of user accounts to data firm Cambridge Analytica broke in March — a scandal that was only compounded by recent news that the tech giant shared even more private data through hidden agreements with other companies. Then in May, the European Union’s General Data Protection Regulation, the world’s most stringent … [Read more...]

TeamViewer Releases Update for TeamViewer IoT with Advanced Feature Set

TeamViewer®, a global leader in secure remote connectivity solutions, today released an update to its dedicated Internet of Things (IoT) solution, TeamViewer IoT. With the latest version of TeamViewer IoT, the German connectivity powerhouse further strengthens its offering in the IoT space. With the update, TeamViewer IoT provides enhanced configuration and troubleshooting qualities as well as … [Read more...]

Anonymous Data Collection Is More Risky Than Users Think

Without much thought, users frequently sign away rights to supposedly anonymous data collected by businesses and other organizations, with the idea that the information will ultimately improve their services and online experience. But a new study from MIT suggests that "anonymous" data can be woven together using multiple sources and is far more identifiable than most people realize.The … [Read more...]

LepideAuditor Adds Data Discovery and Classification Functionality

Lepide is a provider of Data-Centric Audit and Protection (DCAP) solutions that enable organizations to improve their approach to data security and meet compliance demands more easily. They do this through their award-winning DCAP solution – LepideAuditor.The new edition of LepideAuditor introduces data discovery and classification technology that has been completely developed and supported in … [Read more...]