By Sourabh / April 12, 2019 Category: Enterprise By 2020, the global spending on information security is anticipated to reach the $170 billion mark, according to Gartner. Unfortunately for most businesses, more investment in information security isn’t synonymous to a better cybersecurity posture. You might invest in a diversity of tools, but are they really the right tools for your current needs. While some businesses invest in the wrong tools, others might purchase security tools with similar functionalities, leading to obsolete tools. If you end up spending cash on unnecessary security items, the chances are that you will receive less protection from these tools while your IT budget will go to waste. At the end of the day, a cost-benefit analysis might be pivotal in optimizing IT purchases, especially in cybersecurity. Here is how to optimize your IT purchases on cybersecurity tools: Identify What Needs Protection Not all business assets need the same level of … [Read more...] about Best Practices for Optimizing Cyber Security ROI
Gartner cyber security
Gartner expects that by 2021, there will be some 25 billion ‘connected things’ in use. With everything from children’s teddy bears to cars to medical implants now being at increasing risk of either infection by malware or a new means to exfiltrate data, it is not a surprise that the analyst firm expects that by 2021 worldwide spending on IoT will reach US$3.12 billion.Australian-headquartered Cog Systems is one of the businesses working to help secure the exponentially growing Internet of Things (IoT). Cog’s D4 Secure is a microkernel-based platform that employs virtualization and a modular architecture to help lock-down a range of embedded systems as well as mobile devices designed to run the world’s most popular mobile operating system, Android. D4 uses a Type-1 (bare metal) hypervisor based on an L4 microkernal. The system allows an OS, services such as a VPN and firewall, and even specific applications to be isolated. That D4 is based on L4 … [Read more...] about How Australia’s Cog Systems is working to secure IoT
2018 was a year where technology headlines dominated the news – from high profile data breaches from household names, to the implementation of a new piece of legislation that brought data and its usage into the public eye. To get the inside track on what the industry thinks is coming next in 2019, we spoke to a range of IT experts to find the trends that will shape the year to come in technology.One of the primary themes underlying all the technology challenges is the need to provide seamless customer experiences. Rupert Spiegelberg, CEO at IDNow commented: “The ‘Now Economy‘ companies face the challenge of providing their digital customers with a convenient, seamless service, from onboarding to checkout, while remaining cost-effective and in-line with industry and national legislation. In 2019, we will see how both startups and established companies leverage the power of AI technology to develop new digital business models.”Multi-cloud and hybrid … [Read more...] about Cloud, applications, security and data privacy – what do the experts think is coming up next in 2019?
Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is an increasingly intricate puzzle. The stakes, suffice it to say, are higher than ever: The average cost of a corporate data breach is a whopping $3.86 million, according to a 2018 report by the Ponemon Institute. That's 6.4 percent more than the estimated cost just one year earlier. While it's easy to focus on the sensational subject of malware, the truth is that mobile malware infections are incredibly uncommon in the real world — with your odds of being infected significantly less than your odds of being struck by lightning, according to one estimate. That's thanks to both the nature of mobile malware and the inherent protections built into modern mobile operating systems.The more realistic mobile security hazards lie in some easily … [Read more...] about 6 mobile security threats you should take seriously in 2019
In 2017, Warren Buffet said that cyber-attacks are the number one problem with humankind, and the oracle of Omaha seems to be completely correct. From financially motivated cybercrime gangs, to nation state attacking forces, and even simply negligent and ignorant insiders, the sheer volume and potency of threats facing organisations the world over is simply mind-blowing. This makes it difficult for security bosses and even those in their teams to step back, take a breath, and look at the bigger picture. When you’re constantly rushed off your feet, it’s hard to find more strategic ways to tackle the challenges faced. Even more difficult is trying to communicate those same challenges.Fortunately, there are parallels in the financial world that can be borrowed and used to describe and better tell the story of what is happening in the world of security. If businesses can begin to understand that security trade-offs and corner cuttings are debts that needs to be paid, they may … [Read more...] about We understand monetary debt, so why not security debt?