- January 12th, 2015
Just like fashion, malware goes through trends and comebacks, so let’s take a look at what’s ‘in’ this season. Anyone involved in IT in the 1990′s will remember a few things; plaid shirts, floppy disks and macro viruses. Although I can’t envisage the former two making a comeback any time soon, macros are definitely back on the InfoSec agenda, something Microsoft has been highlighting recently.
- December 22nd, 2014
As 2014 ends, many experts in the industry are giving their thoughts on what the New Year will look like from an IT security perspective. From the top ten malware threats to a growing list of security challenges, you’d be forgiven for thinking that CIOs and CISOs face an uphill battle in 2015.
- November 24th, 2014
We’re all used to hearing about malware threats, with new variants of existing malware families appearing on a seemingly daily basis. What is far less common though is a totally new threat appearing, especially one that has apparently been operating unchallenged since 2008. Research published by Symantec describes just this; a new “ground breaking and almost peerless” malware threat known as Regin.
- November 9th, 2014
Earlier this year, a study from IDC and the National University of Singapore (NUS) predicted that enterprises will spend around $500 billion in 2014 on making fixes and recovering from data breaches and malware. In the past few months alone, we’ve seen Target reveal the cost of its recent breach could reach as much as $148 million. The figures are stark, but for the uninitiated the world of malware and its history is something of a mystery. So, where did they originate? How have they changed? And what does the future of malware look like?
- October 13th, 2014
Since the mid 90′s, the internet has had a profound impact on our personal and business lives. It’s transformed how we communicate, how we shop, even how we heat our homes. In an enterprise setting, the internet is the lifeblood of the organization, the engine which keeps everything moving. And yet the World Wide Web, on which we’ve come to depend, can also pose a significant threat if we don’t take the appropriate steps to mitigate its risks.