Brad Hibbert, Lead Solutions Strategist at BeyondTrust shares his ten recommendations that can help you can stop an attacker from penetrating your defences, slow them down, and/or detect them faster in order to mitigate the impact.Read More…

Ali Kaddoura, Country Manager UAE, Citrix discusses the pros and cons of having federated identity, an arrangement that allows subscribers to use the same identification data to obtain access to the networks of all enterprises in the group and what the future might look like for enterprise security in this respect.Read More…

Henk Jan Spanjaard, Vice President of EMEA Sales at A10 Networks  discusses how threat actors are using IoT and connected devices to launch DDoS attacks and what can be done to shield enterprise data, applications and networks from such attacks. Read More…

Kaspersky Lab researchers have discovered a new malware which steals cryptocurrencies from a user’s wallet by replacing their address with its own in the device’s clipboard. Criminals are targeting popular cryptocurrencies such as Bitcoin, Ethereum, Zcash, Dash, Monero and others. Indeed, criminals have already succeeded with bitcoin wallets, earning almostRead More…

Guest Written by the security experts from BeyondTrust; the CTO, Brad Hibbert, the VP Technology, Morey Haber, the Technology Fellow, Scott Carlson and Director of Security Architecture It’s that time of year again when we look back at what has motivated the market for IT cybersecurity solutions in the last yearRead More…

Post Equifax threat, Alastair Paterson, CEO and Co-Founder, Digital Shadows reflects on the lessons we can learn before, during and after discovering a breach to address gaps in processes and technologies and help prevent, detect and mitigate these types of threats.Read More…