Maintaining VDI security hygiene without resistance from employees
One of the biggest challenges is establishing a more cyber-security-focused culture
The Latest On Tech News & Insights
Explore topics on Top Business Tech related to security. Subscribe to TBT today for the latest on AI, IoT, blockchain and emerging technology.
One of the biggest challenges is establishing a more cyber-security-focused culture
The process that follows a data breach – incident response – enables the business to assess and bolster defences. But it’s not always well executed. Jamal Elmellas looks at what you should consider when carrying out post-incident review.
Kris Sharma, Financial Services Industry Leader at Canonical, on how the finance industry can bolster their security efforts with confidential computing – and open up new opportunities by leveraging cloud technology
The latest research paper by Cequence Security details the top API threats detected during the first half of 2022. The report is based on analysis of more than 20 billion API transactions and reveals organisations are being plagued by shadow APIs, API abuse and Account Takeover (ATO) etc. It provides some real insights into the scale of these problems, their costs and repercussions.
What part is technology playing in exacerbating the skills shortage and will advances in automation help or hinder?
Moving to a multi-cloud strategy is not for everyone, and there are barriers and challenges to overcome if this is option is considered
Organisations admit they donât know the value of their insurance policy
Your security system doesnât just protect your company from security breaches and losses – it can also make the onboarding of new hires much easier for your HR staff.
API security tends to focus on threat detection but prevention is every bit as important. Jason Kent, Hacker in Residence at Cequence Security, looks at how this can be achieved through the use of holistic Unified API Protection.
Enjoy an elevated Smart Office Experience on the new HUAWEI MateBook Series, with HUAWEI Mobile Cloud PC Client. Powerful hardware combined with the superior technology of HUAWEI Mobile Cloud offers users a more secure and seamless Smart Office Experience.
The average digitally-savvy individual has hundreds of online accounts, and a dozen (or more) distinct digital âidentitiesâ.The proliferation shows no sign of slowing down, but is also unsustainable.
Investing in Software-as-a-Service (SaaS) has become fairly standard practice within the business world. The subscription format of SaaS naturally appeals to enterprise customers due to its affordability and flexibility.
Prism Infosec achieves IASME IoT Security Assured Assessor Status enabling it to offer ‘hands-onâ certification to IoT manufacturers in alignment with industry best practice.
API security solutions often only address part of the problem, impelling Cequence Security to introduce Unified API Protection. The company has also simultaneously launched API Spyder, an API attack surface detection tool.
API security solutions often only address part of the problem, impelling Cequence Security to introduce Unified API Protection. The company has also simultaneously launched API Spyder, an API attack surface detection tool.
Oracle. One of the worldâs leading software providers, so paying them for support means that you are completely covered, right? Not necessarily.
Never has it been more important for businesses to bolster their defences against cyber-attacks of any description. Steve Whiter, Director of Appurity explains why passwords are an outdated way to secure your self and business against cyberattacks.
98% of employees call for a freedom to focus on their roles in the face of bureaucratic IT security and overload of communication platforms
89% of employees were able to access sensitive corporate applications well after their departure including Salesforce, Quickbooks and other sensitive corporate apps.
The worldâs most popular cloud native vulnerability and risk scanner adds new capabilities to help practitioners seamlessly integrate and scale cloud native security into their Software Development Lifecycle (SDLC)