Why effective fraud prevention requires contact data quality technology

Fraud poses a big and growing danger for any organisation. Recent research by Ravelin backs this up by revealing that 75 per cent of businesses globally experienced an increase in online fraud over the last 12 months, with 84 per cent of organisations in the UK confirming growth in online fraud over this timescale – the most […]

Cybersecurity Awareness month: Security is a shared responsibility

These days, nearly all of us are consumers of applications and APIs. We interact regularly with websites and/or applications, whether they are financial, retail, insurance, travel, food, or otherwise in nature. What we may not realise when we go about our daily business, however, is the extent to which attackers and fraudsters are motivated to […]

Navigating the rising tide of DDoS attacks 

This year’s Cybersecurity Awareness Month highlights the theme “Being Smarter than the Hacker” as businesses face mounting cyber risks. Among the most pressing cyber risk concerns for businesses are distributed denial-of-service (DDoS) attacks, which have surged dramatically in frequency, magnitude, and complexity.   Data recorded by GTT indicates a troubling 25% increase in multi-vector DDoS attacks during the first […]

The path of least resistance to Privileged Access Management 

Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into […]

Five cybersecurity priorities for our new global governments

2024 was dubbed “the election year” by TIME Magazine – a simple yet accurate description. From the UK’s general election earlier this summer, to the upcoming presidential election in the US in November, and the other 62 countries (at least) voting this year, it is time for governments to really make an impact. When it […]

Data Resilience and Protection in the Ransomware Age

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7’s Ransomware Radar Report 2024 which states, […]

 A Roadmap to Modern Application Security

A decade ago, Silicon Valley venture capitalist Marc Andreeson famously declared that “software is eating the world.” A bold statement at the time. But it has since become clear that Andreeson was right. Software is now ubiquitous – and it touches nearly every aspect of our lives. Today’s shift to software has had a profound […]

Final countdown to NIS2: How ISO 27001 accreditation can be a key ally in achieving compliance

In today’s fast-paced business environment, technology is central to enterprise success, often underpinning efficiency, innovation and competitiveness. From advanced data analytics to cloud-based models, modern companies are now leveraging a wide range of digital tools to boost productivity and streamline operations. That said, firms need to consider several factors to ensure that technology is a […]

Don’t Expect Cybersecurity to Work in Firms Where Nothing Does

You cannot expect the CISO on their own, bottom-up, to reverse widespread business dynamics, where short-termism prevails everywhere across the business. I have written at length about the difficulties many large organizations encounter with cybersecurity, and their endemic execution problems when it comes to protecting themselves from cyber threats. While the diagnostic is relatively clear in my view, there […]

How Organisations Can Master Incident Reporting Obligations Under NIS2

The new NIS2 directive is designed to strengthen the cyber resilience of over 160,000 companies that operate in the EU – either directly or indirectly. Coming into force by 17th October, NIS2 regulations will outline how these essential entities can combat increasingly sophisticated and frequent cyber attacks. Notwithstanding delays in the implementation of local legislation, the […]