BLOG

IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation...

Read More

BLOG

IT weaknesses - the barrier to enterprises becoming security-first

Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to support on-premise networks, but often create complicated network environments in the process. By Justin Calmus, Chief Security Officer at OneLogin.

Read More

BLOG

Achieving the right balance between insight and data privacy

Mark Humphries, Managing Consultant for Civica Digital, explores the importance of data structure and governance for insights-driven councils and public bodies.

Read More

BLOG

From preparation to implementation: How to fully adopt automation in 2019

The last 12 months have seen a shift in how enterprises view automation and its benefits to their security and DevOps teams. Last year, it was found that more than three-quarters of organisations would like the ability to automate some of the day-to-day manual tasks related to their security information and event management (SIEM) systems. Yet, many of those businesses also admitted they are concerned about executing automation because they do not have the employees with the right skillset to...

Read More

BLOG

Where does responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and fortress-like mentality. By Scott Gordon (CSSP), CMO, Pulse Secure.

Read More

BLOG

GDPR – Keeping a Continuous Focus on Compliance

The General Data Protection Regulation (GDPR) came into force on 25 May 2018. In the months that followed, the regulators were quiet, but businesses would have been unwise to have been lured into a false sense of security. In fact, data breach notifications were being collected and enforcement actions beginning behind the scenes. By Michael Mittel, President and GM, RapidFire Tools, a Kaseya Company.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more