Security

Knowledge is power in the fight against cyber attacks

Knowledge is power in the fight against cyber attacks

The Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework as part of its commitment to improve the levels of understanding and professionalism in the face of a growing tide of cybercrime and attacks. The new Framework expands on the established IISP Skills Framework and defines the knowledge that information security Continue reading Knowledge is power in the fight against cyber attacks

The rise of the machines in the fight against cybercrime

The rise of the machines in the fight against cybercrime

Biometric-based authentication is set to become more prevalent in the UK, as over half (53%) of organisations expect to significantly increase their investment in biometric technologies. The report, carried out by Callcredit Information Group, revealed the key biometric technologies organisations are planning to introduce in identity verification procedures over the next three years, as part of their ongoing Continue reading The rise of the machines in the fight against cybercrime

Cyber security: the biggest barrier to financial innovation

Cyber security: the biggest barrier to financial innovation

According to a study conducted by international law firm Simmons & Simmons, 71% of the world’s largest banks and asset management firms have said cyber security is the biggest risk associated with working with FinTech firms. Breaking this down, in Germany 64% felt this way, while 70% did in Hong Kong + Singapore 70% and Continue reading Cyber security: the biggest barrier to financial innovation

Access all areas? Tracking and managing the privileged users

Access all areas? Tracking and managing the privileged users

An organisation’s privileged users pose a very particular set of security challenges. These are the users with more authority to access systems and data than general users; and the greater the privileges, the greater the security risk. They hold the keys to a wealth of valuable information and, in the wrong hands, these privileges mean Continue reading Access all areas? Tracking and managing the privileged users

The enemy within: data thieves lurk within an organisations’ ranks

The enemy within: data thieves lurk within an organisations’ ranks

In today’s digital environment, businesses face a daily struggle against a host of maleficent cyber threats, ranging from evolving malware to phishing scams. But the biggest and most malicious threat originates from within. The hundreds of thousands that organisations spend on prevention, detection and incident response security solutions can be undermined by a single employee: Continue reading The enemy within: data thieves lurk within an organisations’ ranks