Published By: Websense
Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Published By: Logrhythm
Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
As more and more data pours into the office of the CFO, experts say, minimizing its complexity and maximizing its usefulness becomes critical. “The amount of data is phenomenal,” says Mr. Whitehead of Airbus Defence and Space, “but what’s worse is the lack of harmonization. Unstructured data is what kills you. The key for me is how to have clear data in a usable and consistent form, which can be turned into succinct information the business can look at, understand where the value chain is, and make decisions.”
Published By: Redstor UK
Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have.
Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Published By: Proofpoint
Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable.
Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains.
Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners.
Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
The number one technology issue in the C-suite today is cyber-security.
And there’s no wonder—attacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 – equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable – while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year.
That’s why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties.
Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable.
These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.
Data Centre Dynamics Ltd.
102-108 Clifton Street
London EC2A 4HW