Industry News

CCSE

News

Features

  • MSPs

    Managed service providers (MSPs) are at a crossroads in terms of what security services they are going to offer their customers. The dynamic digital landscape has required them to include some kind of security. At the same time, they know what they are currently offering isn’t going to serve them or their customers in the long term. Fortunately, MSPs don’t have to go it alone; they can partner with Managed Detection and Response (MDR) providers to fill in the gaps in their security portfolios and give them a superior competitive position.

    The post How MSPs can serve customers’ security needs appeared first on Techerati.

  • The Covid-19 pandemic has led many companies to alter the way they conduct business, in many cases evolving to a new way of running operations. Some businesses have been fortunate where operating models have stayed in line with "Business as Usual". However, in most cases businesses have either had to adapt or evolve into a new operating model.

    Information security and cyber defence teams have a challenge ahead of them, they will not only have to run normal day-to-day operations but now must understand the new threat vectors that are being introduced that widen the threat landscape, and work to minimise cyber risk so businesses stay protected.

    The post Adopting a new operating model? Don’t leave your business exposed appeared first on Techerati.

  • Cybersecurity teams are some of the most risk averse people in any organisation -- they have to be. In our new coronavirus-induced reality, however, this trait is being challenged.

    Security pros dipping their toes into cloud applications have been forced firmly out of their comfort zones. Instead of vetting remote work or cloud-based systems one by one over a suitable period, companies are spinning up multiple overnight. And this is against the backdrop of all of the other numerous fears and anxieties that a global pandemic brings to the table. It doesn’t matter if you’re in marketing, finance or IT: high-pressure situations breed errors.

    “The combination of these factors together makes this a very risky situation for a lot of organisations,” says Jeremy Snyder, VP of Business Development and International Strategy at cloud security company DivvyCloud. 

    The post As remote working explodes, cloud visibility is no longer a “nice to have” appeared first on Techerati.

  • cyber

    What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent years, some in the cyber world recognize that there is a lot to learn from the biological world when protecting systems against viruses. Now, the Corona epidemic presents an opportunity for the medical world to learn something from the cyber world. To analyze the strategies selected by various countries, let’s review it through the lens of cyber strategies. Let’s begin by recognizing that cybersecurity is built in layers. There is no one magic solution or layer which will prevent all the possible attacks. Furthermore, in the cyber world, it has been realized for some time that it is impossible to protect everything for all eternity. There will be victims.

    The post A cyber approach to coronavirus containment appeared first on Techerati.

  • Cyber criminals coronavirus

    As we all adjust to working remotely, security teams across the world are grappling with a very serious challenge. Almost overnight our companies have changed. Well established procedures are being rewritten, best practices quickly rethought, and policies stretched to breaking point.

    Business transformation is always a security risk. New technology and working practices need new security measures; but normally this risk is managed carefully, and over time. Covid-19 has not afforded us that luxury. For some businesses the scale and speed of this change will be unprecedented. It is also very public; attackers are aware of the situation and already exploiting it. Below are some of the most serious threats that security teams will face over the coming weeks.

    The post Remote working risks: 6 security-threats facing companies during this difficult transition appeared first on Techerati.

  • As enterprises go digital and integrate new technologies into their business, public sector organisations have been left scrambling to keep up with the new digital age. This is a mammoth challenge for a public institution like the NHS which operates across a massive scale and hosts huge amounts of data.

    It’s not as simple as moving away from legacy infrastructure to a cloud platform in a few easy steps. It’s a complicated project that encompasses different areas including cyber security, networking, data and cloud. The issue facing the NHS and other public sector organisations is prioritising one area without compromising another. It’s a careful balancing act to ensure that the NHS can achieve its aim of becoming digital and agile, whilst deploying a stringent cyber security strategy in order to protect its new digital system, critical services and confidential data. 

    The post Digitalising healthcare: the key to being secure and agile appeared first on Techerati.

Latest News

  • 07-Apr-2020
    10:25

    Separating this pandemic from predecessors is that information technology is firmly on our side. In the absence of sport, Netflix is keeping families entertained. FaceTime or Zoom are connecting us safely from a distance while ordinary socialising presents a risk. And a plethora of cloud-based workplace tools are channelling business productivity from newly-distributed workforces.

    Nobody doubted our dependency on connectivity before coronavirus, but the degree to which the thread of the internet holding the fabric of society together during the crisis is striking. While restaurants, pubs, cinemas, cafes and more turned off their lights, data centres, network operations centres and internet exchanges geared up for an unprecedented rise in traffic. 

    The post Network strain: The risks and the reality appeared first on Techerati.

  • 07-Apr-2020
    09:43
    ManageEngine

    Tune in to this free webinar and learn about the right tools and techniques to oversee your organization's remote workforce, facilitate optimum productivity, maintain cyber hygiene, and ensure peace of mind for you and your IT team.

    The post Tips to create an effective remote access plan appeared first on Techerati.

  • 07-Apr-2020
    09:36

    The Covid-19 pandemic has led many companies to alter the way they conduct business, in many cases evolving to a new way of running operations. Some businesses have been fortunate where operating models have stayed in line with "Business as Usual". However, in most cases businesses have either had to adapt or evolve into a new operating model.

    Information security and cyber defence teams have a challenge ahead of them, they will not only have to run normal day-to-day operations but now must understand the new threat vectors that are being introduced that widen the threat landscape, and work to minimise cyber risk so businesses stay protected.

    The post Adopting a new operating model? Don’t leave your business exposed appeared first on Techerati.

Sponsors

Diamond Sponsor

  • Sophos

Headline Sponsor

  • IBM

Lead Sponsor

  • Oracle

Keynote sponsor

  • Eset
  • Menlo security

 

Theatre sponsors

  • IMSM
  • appcheck
  • Trend Micro
  • Manage engine
  • Crowdstrike
  • AppGate

 

Platinum Sponsor

  • Tresorit
  • Barracuda
  • CrowdStrike
  • cloudflare
  • KnowBe4

Stream Sponsors

  • BigID
  • Bitdefender
  • Sophos
  • Cloudflare
  • snyk

 

Stream Sponsors

  • IRM
  • McAfee
  • DarkTrace
  • Sophos

Gold Sponsors

  • Darktrace
  • Distology
  • Heficed
  • Egnyte
  • DivvyCloud
  • Whitesource
  • Exclusive Networks
  • vm ware- carbon black

Gold Sponsors

  • Esentire
  • TripWire
  • Wandera
  • IRM
  • NCC Group
  • SafeGuard Cyber

 

Silver Sponsors

  • Global SIgn
  • Code42
  • illumio
  • VeraCode
  • Locke & Mccloud

 

Silver Sponsors

  • Istorage
  • Neustar
  • Owl

 

Silver Sponsors

  • SOTI
  • cloudbric
  • PCYSYS
  • SentinelOne

 

Partners

Security Education Partner

  • ISC2

 

Event Partner

  • CyberSecurotyJobsite

 

Event Partner

  • Crest
  • tech HQ
  • cisco

 

Media Partner

  • CIO Applications
  • Jicara

 

Media Partner

  • CIO Net
  • Frontier Enterprise

 

Media Partner

  • Cyber Security Europe
  • Cyber Defense Magazine
  • Elite Business Magazine

 

Media Partner

  • Computing Security
  • Network computing
  • Storage magazine

 

Media Partner

  • CPO Magazine
  • Brilliance security magazine

 

Media Partner

  • UK Cyber Security Association
  • Digital agency network

 

Media Partner

  • Tech Target
  • Silicon

 

Media Partner

  • Start up city
  • Gigabit

 

Media Partner

  • Admin Magazine
  • DevOps Online

 

Media Partner

  • Alphr.com
  • Cloud pro

 

Media Partner

  • channel pro
  • IT Pro

 

TV Partner

  • disruptive live