aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
12/22/2014 7:29:30 AM
Contributor:
James Maude

From Year of the Breach to Year of the Solution

As 2014 ends, many experts in the industry are giving their thoughts on what the New Year will look like from an IT security perspective. From the top ten malware threats to a growing list of security challenges, you’d be forgiven for thinking that CIOs and CISOs face an uphill battle in 2015.

Continue reading
Date published
9/24/2014 3:58:29 PM
Contributor:
James Maude

Controlling the breach

Once again we are witnessing the aftermath of another major data breach. Although the name of the retailer has changed from Target to Home Depot, the rest of the story remains the same. A large scale exfiltration of customer card data that went undetected for several months.

Continue reading
Date published
3/12/2014 11:21:33 AM
Contributor:
John Dunn

What can we learn from the latest data breaches?

We must hope that January’s huge data breach at Target will be a turning point in the history of data breaches. For the first time, businesses are starting to ask difficult questions - might the fact that one of the US retail sector’s most respected retailers can be breached with such ease not be telling us that something is profoundly wrong with enterprise security?

Continue reading