Tech Complexity Puts UK Cybersecurity at Risk

Tech Complexity Puts UK Cybersecurity at Risk

The ever-increasing complexity of technologies that security leaders have to manage can be daunting and impacts their ability to keep their systems secure. According to Palo Alto Networks’ latest research, published on March 13 at the provider’s Ignite event in London, almost two-thirds (64%) of UK organizations cited technology complexity and a lack of interoperability as the most significant challenge towards building a sophisticated security posture. One major issue is the fragmentation of security solutions,…

Read More

The future of enterprise protection: Integrated data security platforms

The future of enterprise protection: Integrated data security platforms

Less than five years ago, one would have been hard-pressed to find information on Data Security Posture Management (DSPM). Today, it is a central pillar of modern cybersecurity strategies. The growth of DSPM from a relatively new technology to a must-have capability of the cybersecurity landscape reflects the growing need for organizations to protect and control their data in the face of increasing complexity in the cloud and the broadening use of AI in the…

Read More

VC Investment in Cyber Startups Surges 35%

VC Investment in Cyber Startups Surges 35%

Venture capital (VC) funds flowed in their billions to cybersecurity startups in the last three months of 2024, even as the number of deals fell, according to new data from PitchBook. The capital market data specialist claimed in its Q4 2024 Information Security VC Trends report that $3.5bn was invested in the sector in the period, in North America and Europe. That represents 35% year-on-year (YoY) growth and a 44% increase from the previous quarter….

Read More

UK ICO Fires GDPR “Warning Shot” Over Use of Children’s Data

UK ICO Fires GDPR “Warning Shot” Over Use of Children’s Data

The UK’s data protection watchdog has warned that a new investigation into TikTok and others over their use of children’s data should be viewed as a “warning shot” by smaller digital firms. Information commissioner John Edwards made the remarks at the IAPP Data Protection Intensive UK 2025 conference in London yesterday. He said that organizations of all sizes should see the regulator’s latest investigations as “a sign to get your own house in order,” and…

Read More

IT leaders: What’s the gameplan as tech badly outpaces talent?

IT leaders: What’s the gameplan as tech badly outpaces talent?

Offering this kind of training to employees could be a recruiting advantage for companies. According to Korn Ferry’s global workforce survey of 10,000 professionals, released in late October, development opportunities were the fourth most important factor in accepting a new job offer, after flexible working hours, generous compensation, and job security. However, only 32% of companies say they plan to focus on upskilling current employees to address skill gaps. To help address the skills shortage,…

Read More

6 Potential Security Concerns With the Eventual Rollout of 6G

6 Potential Security Concerns With the Eventual Rollout of 6G

6G could be available by the end of the decade, which should decrease latency and connectivity speeds for users. However, these wireless networks present new cybersecurity challenges. What should industry professionals prepare for? What Is 6G? 6G will be the sixth generation of wireless technology once it arrives. Experts say it could debut by 2030, though companies started 5G-Advanced integration in 2024. Terahertz (THz) frequencies will be a key part of 6G, as it can quickly…

Read More

DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware

DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware

Tenable Research examines DeepSeek R1 and its capability to develop malware, such as a keylogger and ransomware. We found it provides a useful starting point, but requires additional prompting and debugging. Background As generative artificial intelligence (GenAI) has increased in popularity since the launch of ChatGPT, cybercriminals have become quite fond of GenAI tools to aid in their various activities. However, most traditional GenAI tools have various guardrails in place to combat attempts to use…

Read More

Leading the Charge: Delaware State University's Digital Evolution

Leading the Charge: Delaware State University's Digital Evolution

Picture a university where the digital landscape is as dynamic as the students it serves—where every classroom is a gateway to global learning and every network is a fortress of security. At Delaware State University (DSU), this is not merely a dream but a realized vision, thanks to a bold digital transformation and a strategic partnership with Cisco. Overcoming Initial Challenges When Darrell McMillon joined DSU in 2020 as the Vice President and CIO, he…

Read More

칼럼 | CISO와 벤더의 ‘어긋난’ 관계, 어떻게 해야 회복될까?

칼럼 | CISO와 벤더의 ‘어긋난’ 관계, 어떻게 해야 회복될까?

CISO의 받은 편지함에는 사이버보안 분야의 판도를 바꿀 기술을 개발했다고 주장하는 벤더 홍보물이 가득할 가능성이 높다. 만약 벤더라면 보안 및 위험 관리의 문지기인 CISO에게 다가가기가 얼마나 어려운지 알고 있을 것이다. 양측 모두 각자의 입장이 있다. CISO는 효과적인 솔루션이 필요하고, 벤더는 진정으로 문제를 해결하고 싶어한다. 하지만 어느 시점부터 벤더와 CISO를 연결하는 프로세스가 비효율적이고 어색해졌으며, 심지어 매우 불편한 상황이 됐다. 필자는 이런 문제를 직접 경험하면서, 더 깊이 파고들어 ‘어긋난 관계’의 미묘한 차이를 이해하고자 했다. 그래서 엔터프라이즈 브라우저 기업…

Read More

“통합 MSP 전략 강화”··· 베스핀글로벌, 프라이빗 클라우드로 영역 확장

“통합 MSP 전략 강화”··· 베스핀글로벌, 프라이빗 클라우드로 영역 확장

베스핀글로벌은 최근 VM웨어의 가격 인상과 정책 변화로 인해 가상화 환경을 운영하는 기업들이 대안을 검토하고 있다고 언급했다. 비용 절감과 벤더 종속성을 줄이기 위해 오픈스택(OpenStack)과 프록스목스(Proxmox) 같은 오픈소스 기반 솔루션이 대체재로 떠오르며, 전용 클라우드(Dedicated Cloud)에 대한 수요도 빠르게 증가하고 있다는 설명이다. 베스핀글로벌은 10년간 축적해 온 클라우드 기술력과 MSP 경험을 바탕으로 프라이빗 클라우드 시장으로 영역 확장을 본격화할 계획이다. ▲V2V(Virtual Machine to Virtual Machine) ▲컨테이너화(Containerize) ▲분산 클라우드(Distributed Cloud) ▲퍼블릭 클라우드 등 고객이 선택한 전환 전략에 맞춰 IT 환경 최적화를…

Read More
1 165 166 167 168 169 3,972