Software Contract Solutions

WannaCry’s EternalBlue exploit still a threat

A year after the global WannaCry attacks, the EternalBlue exploit that was a key enabler for the malware is still a threat to many organisations, and many firms have not taken action, security researchers warn. WannaCry is no longer wreaking havoc in the business world, but a year after the malware crippled business operations around the … Read more

Cloud security: The skills gap is delaying cloud migration

Having poor talent is worse than not having the talent at all, and too many enterprises lack both the skills and the talent for cloud security. A new report from McAfee highlights the skills gap when it comes to security in the cloud. The report reveals that one in four organizations using infrastructure as a service (IaaS) … Read more

Protecting data in a hybrid cloud environment

In an era when ‘data is the new oil,’ protecting your business’ data is a critical element of your storage strategy. Here’s how you can keep your customers’ information – and your own business – safe and sound. The past few months have been incredibly instructive on the critical importance of keeping one’s data safe, … Read more

A corporate guide to addressing IoT security concerns

The benefits of the internet of things are potentially great and can be achieved with less risk of harm by following these steps. The Internet of Things (IoT) promises benefits for companies, including rich supplies of data that can help them more effectively serve their customers. There’s also a lot to be worried about. Because … Read more

The cyber security challenges facing emerging fintech startups

A shakedown is happening in the financial world. The traditional banking giants are struggling to retain customers, and an emerging market of fintech companies are collecting them en masse. In 2017, 13 fintech startups were valued at $1 billion or more, an achievement so rare that Silicon Valley classifies it as unicorn status. A growing industry, … Read more

Cyber attackers can breach targets in hours, report reveals

The majority of hackers claim they can breach an organisation within hours, while most security professionals admit they do not know what to look for. The majority of cyber attackers (71%) can breach a targeted organisation within 10 hours, and 18% claim they could breach a target in the hospitality and food and beverage industries … Read more

Cisco broadens Tetration security delivery with cloud, virtual buying options

Cisco’s Tetration-V and Tetration-SaaS give businesses interested in the security-analytics platform the option of a cloud service or software that runs on virtual appliances. Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system. Cisco’s Tetration system gathers information from hardware and software sensors and … Read more

Retail sector top cyber attack target

The retail sector was the top cyber attack target in 2017, as cyber attacks evolved to become more organised and structured, a report reveals. The retail sector suffered the most breach incidences (16.7%) in 2017 as attackers became more organised, the latest Trustwave security report shows. The retail sector was followed by the finance and … Read more

IoT security spending to spike above $1.5 billion in the next year

Corporate spending to protect internet of things devices will be driven to a large extent by regulatory requirements, Gartner says. The market for IoT security products is set to grow sharply, as the general IoT market becomes ever more ubiquitous, according to a report released this month by Gartner Research. While there are numerous drivers … Read more

New ways in endpoint protection: What should CIOs pay attention to?

With large-scale cyber attacks and dangerous vulnerabilities such as WannaCry and Spectre, companies have reached a point where the use of traditional antivirus (AV) technologies are no longer sufficient to effectively protect endpoints from hackers. Why signature-based AV is no longer effective Antivirus technologies have not evolved much over the last fifteen years. Their detection model … Read more