The top five impersonation techniques – and best practices to help reduce risk

Impersonation attacks are on the rise as attackers switch gears to target an increasingly remote and distracted workforce. Impersonation not only enables cybercriminals to gain trust and manipulate victims into disclosing sensitive data, but also significantly boosts their ability to successfully execute cybercrime. Such attacks are usually hard to detect and at times, leverage legitimate resources and channels for execution.

Impersonation attacks may not be new to the world of...

Five leading trends of database innovation: Cloud-native, self-driving, and more

In the wake of the pandemic, one trend that emerged is the need for digitalisation, and this will continue – and even grow – in the future. And, while it’s still not clear exactly what that actual economic impact of Covid-19 will be, IDC predicts that the digital economy will accelerate to counter this. The firm predicts that over 65% of APAC GDP is expected to be digitalised between 2020 and 2023 and spending will hit US$ 1.2 trillion.

As businesses – and even economies...

Data discovery: Defining a clear path to unlocking your most valuable asset

Data is now inevitable for every business. By the end of 2020, estimates found that 1.7 megabytes of data for every single person on the planet got produced each second. That’s 6 gigabytes per person (think storage for about 1,500 songs) created each hour.

In this world, it’s no longer a question of if your business will use data, but rather how you will use it. Specifically, how will you control it, manage it, secure it and — most importantly — use it effectively as a...

Why Covid-19 is teaching enterprises how to mind the cybersecurity gap

30% of US and UK remote workers say their organisations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on their devices to access certain applications while working remotely And one in four US remote workers use their work email and passwords to log in to consumer...

Google Cloud discloses carbon performance for data centre zones to help inform customers

Google Cloud has continued its climate push by declaring how clean its data centre regions are - so customers can understand where to invest.

The hyperscaler had made a 24/7 carbon-free commitment back in September, promising to run its business on carbon-free energy everywhere by 2030. The commitment was described by Google as its 'most ambitious energy goal yet', with the company having become fully carbon neutral for the first time in 2017.

The carbon data shared for...

Exploring corporate banking’s growing business case for cloud migration

The impact of public cloud on retail banking is already clear. As a mainstream technology, cloud enables top initiatives such as digital, mobile, and customer analytics. In the corporate banking segment, the pace of cloud adoption and migration has been slower. Top among the forces impeding legacy transformation and the move to the cloud: security and compliance concerns.

Today, corporate banking’s approach to innovative technologies and cloud computing is changing. While...

How remote working demand continues to disrupt IT security norms

Enterprise IT security investment in critical infrastructure has been consistent over the last 12 months, regardless of huge disruptions from the global Covid-19 pandemic. The resulting effect has been mostly in increased demand for secure 'remote working' connectivity.

Cybersecurity spending announced by governments has not really changed significantly, with most maintaining similar funding planned in previous years, and an average year-on-year growth rate between 5% and...

A guide to privileged access management: The doorman for the cloud

After a year when digital transformation took a quantum leap at most enterprises and remote work exploded, it’s no surprise that the majority of enterprise workloads are now running in cloud-based infrastructure as a service (IaaS) and platform as a service (PaaS) offerings. 

This is creating a whole new set of security challenges around managing access to your organisation’s infrastructure across multiple cloud platforms—with all the various identities and configurations...

Best-in-breed cloud security: Catering to all types of cloud

As cloud adoption continues to transform the modern enterprise, organisations consume the cloud differently as they extend the scope and scale of their digital business strategies. They have the option to pick and choose from various hybrid cloud infrastructures and services. But using disparate services and solutions—such as multi-cloud, hybrid environments, software as a service (SaaS) and platform as a service (PaaS), plus various applications and endpoints—introduces implementation,...

Cloud security fears continue: Managed services, messaging, FaaS at ‘perilous’ stage

As adoption of managed infrastructure services increases, new cloud attack areas arrive with them. According to a new report from Accurics, 23% of all security violations identified relate to poorly configured manage service offerings.

The study, Accurics' Cloud Cyber Resilience Report, assessed violations and drifts in real-world environments of Accurics users, as well as open source repositories and registries of infrastructure as code (IaC) components.

On average, the...