Featured White Papers
The digital economy—today and into the future
Today’s enterprises are experiencing increasing pressures that are disrupting their traditional business model. If customers do not address these pressures and evolve, they may risk the loss of market share, revenue, decreased stock prices, and more.
Boards of directors are too often kept in the dark about the security risks to their organisations. That’s what the Ponemon Institute discovered last June when they surveyed members of the board of directors and IT security experts from the same companies.
The Ponemon researchers found that 30% of directors acknowledge that they don’t understand the risks that their organisation faces in security matters. Yet more than 50% of the IT security experts believe that the directors who sit on the boards of their companies don’t understand the security environment that they are working in, or the risks it represents. Read this today..
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.
There appears to be no end in sight to the reign of phishing as the cyber attacker's number one threat delivery and communication vehicle. No surprise that the Verizon DBR 2017 report dubbed email as the "cyber spy's favored way in". Whether it's a script kiddie just goofing around, a member of one of the world's most sophisticated nation-state-based attacker groups trying to impact global politics, or a cybercriminal focused on turning digital information into digital cash, they all use email in their attack repertoire.
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity.