Last week marked the 50th anniversary of the ATM, a device that changed the face of personal monetary transactions forever. According to the ATM Industry Association (ATMIA) there are now close to three million of them worldwide, with over 70,000 in the UK alone where it all began. On 27th June 1967, the world's first "hole in the wall" was revealed at Barclays Bank in Enfield, London. Celebrations aside, I’d like to look at exactly what’s going on under the hood from a software perspective. Is securing them through industry best practice is realistic and practical?
Sandra Salame, Operations Manager at Crestan, talks about the benefits of a partnership with Avecto and discusses our successful Middle East roadshow featuring award-winning speaker and Microsoft MVP Sami Laiho.
From the genius of Alan Turing and the development of “Baby”, the world’s first computer, all the way through to the discovery of Graphene - Manchester has long been a technology trailblazer.
Twenty-eight percent of security spending is wasted on shelfware, according to CSO's news article earlier this year. Shelfware, in case you don't have any of your own, and aren't familiar with the term, is a word coined by the technology industry to refer to something that is purchased but is never put in to production.
Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.
Malware is an ever evolving field and as such security should be seen as a journey not a destination. One of the latest malware evolutions is the practice of Malvertising where attackers place malicious content in seemingly innocent adverts. When the user views the page the advert is loaded and the malware attempts to exploit the machine.