Tag Archives: Security

Silex Insight and Andes Technology partner on Root-of-Trust security IP solution​

Silex Insight and Andes Technology Corporation are partnering to bring on Root-of-Trust security IP solutions integrated with RISC-V core. Silex Insight’s advanced eSecure IP module, including security boot, sensitive key material and asset protection enables security applications to shield confidential information from untrusted applications running on a main processor. In the previous partnership, Andes Technology provided a high-efficiency and …

Read More »

Is AI vital to keeping backup data safe from malware?

Every day more than 350,000 new types of malware are unleashed on the Internet. The scale of the problem is so massive, it is no longer enough to have traditional anti-virus software, solely defending against known threats. We spoke to Tom Hext, AI Product Manager at Redstor, about the problem …

Read More »

Out With the Old

Richard Buxton, Director, N4Engage looks at the benefits of integrating collaboration and communication. In the current climate, many organisations have embraced platforms such as Microsoft Teams, Zoom and Webex among many others for their daily collaboration and communication needs. All of the major providers have reported massive growth in user …

Read More »

How low-code can improve remote corporate security

Richard Farrell, Chief Innovation Officer at Netcall discusses how technologies such as low-code can help mitigate increasing cyber risks Company data breaches regularly make the headlines, putting customers at risk and incurring reputational damage. Over the last year we have seen some of the highest-profile data breaches in history. Whilst …

Read More »

Data privacy: Eights steps to consider

Chris Stennett, Global Vice President, Business Value & Strategy at Sitecore explains why data security and privacy compliance are key for building consumer trust Data privacy has changed the way businesses operate – it’s no longer the sole concern for legal teams, as it has now become an imperative across …

Read More »

PCR April 2021 data handling: Keeping data secure

Nick Hutson-Alvarez, Exertis Group Head of Cyber Security & Compliance discuses some important factors to consider to keep data secure. There are varying degrees of online security that can be driven by some very complex systems which are designed around industry standards, such as PCI DSS (Payment Card Industry Data …

Read More »

Help your customers reclaim their right to privacy

Steve Hicks, Head of Global Sales, BullGuard looks at why personal data is big business and why we should value our right to privacy Whichever way you look at it, people the world over have essentially uploaded their entire lives online in return for social media profiles, apps, e-commerce benefits, …

Read More »

Pax8 and LogMeIn partner on lastPass single sign-on and password management capabilities

Pax8 is partnering with LogMeIn on password management and single sign-on solution, LastPass, to managed service providers (MSPs) giving them visibility and control over every access point of their clients’ businesses in North American and the UK. “We are excited about the partnership with LogMeIn and to offer partners their award-winning …

Read More »

Retail cost of data breaches among the fastest growing in all sectors

NordVPN Teams and NordVPN have released data showing the average cost of a data breach in the retail industry is $2.01 million — the third fastest-rising figure in all sectors. The shift to e-commerce and a 16.5% increase in sales last year have presented more cyberattack opportunities. In recent years, …

Read More »

Gigamon Hawk delivers pervasive visibility across the digital enterprise

Gigamon has announced its latest Gigamon Hawk technical integration with FireEye, Inc., the intelligence-led security company. Gigamon Hawk is now integrated with FireEye Network Security, to provide a unified view across hybrid infrastructure through a single, simple interface with built-in management and reporting. “Gigamon Hawk establishes an important precedent for …

Read More »