Facebook iconTwitter icon
B2B-Network:
Latest Articles
Study
IT Security 2018: These were the 3 big concerns of IT managers
Thumb sorgen it verantwortliche

Thinking of the IT security incidents of 2018, threats like Spectre, Coinhive and Scarab come to mind. These were events that were covered by the media and attracted widespread attention. And they were examples that made it clear that IT security in companies is more relevant than ever before. But do these incidents also reflect the issues that most interest IT decision-makers? An exclusive flash study by itsecurity-xpert.com now provides insightful answers. In cooperation with the B2B platform selfcampaign, we have scrutinised the online behaviour of IT decision-makers. The study is based...

» Read more
Study
Insights for CISOs from the Recent Fortinet Threat Landscape Report
Thumb fortinet threat landscape report

Keeping the much-needed pace with the current changes in the security and treat landscape is a massive task. Over time, Chief Information Security Officers have discerned which ones have actionable recommendations and insights and those that overhype their findings and provide essential or useful intelligence that any firm can act upon. 

Recently, Fortinet which is a global security leader released the findings of the latest quarterly Threat Landscape Report. This research reveals that security threats are currently on the rise and undergoing an evolution to become more sophisticated....

» Read more
Inside Story
The Most Stubborn Myths About Email Encryption
Thumb totemo e mail verschluesselung

Email encryption is an important way to protect sensitive data. However, many companies still do without it. They find the technology too expensive, too complicated, or even unnecessary. It's high time to get rid of these stubborn myths.

Email encryption? – I don't need it! This may be what some small or medium-sized companies think. What do I have to hide? Who argues in such a way, goes into dangerous terrain. Because in fact it is legally prescribed to encrypt e-mails with personal data - and not only since the new EU data protection basic regulation. This was...

» Read more
Study
DigiCert Survey: The Corporate Losses Associated With the IoT Security
Thumb iot security

The Internet of Things is currently ramping up, with 92% of companies indicating that it will be essential in the next two or three years. Organisations that are not prioritising the security for their Internet of Things deployments may encounter significant losses upwards of hundreds of millions of dollars.

The current state of the Internet of Things Security Survey by the DigiCert company explores common practices and security behaviours among the best firms. Here are the main findings of the survey. 

 

Main Findings 

The recent study from the DigiCert, Inc., which is a...

» Read more
Study
Latest research shows that corporate IoT security is a major concern for many businesses
Thumb iotsicherheitsstudie

Technology security specialists DigiCert have released a study revealing that many organisations are sustaining significant financial losses as a result of insecure IoT environments. Digicert estimates that 25 percent of IoT companies have sustained financial losses of approximately £34 million in the last two years. 
 

Why are these companies losing so much money?

IoT organisations are primarily losing money because of weak security. This makes them more susceptible to attacks by hackers and data thieves, and DDoS attacks are on the increase. 

DigiCert's...

» Read more
Analysis
Securing Your Mobile Applications from Cyber Threats 
Thumb applicationsecurity

Mobile applications are powerful business tools that facilitate communication, transactions, and business continuity. As smartphone usage increases over the world, there is an urgent need to secure applications for the protection of both user and company data. 

To ensure the perfect functioning of apps, it is essential for developers to put in place a mobile security testing strategy that will unearth any security loopholes and subsequently fix the issues to thwart any attempted hacking, tapping or other cyber threats. 

 

Why It Is Crucial To Test Mobile Security 

...

» Read more
Comment
Applications of Machine Learning in Cybersecurity
Thumb machinelearning cybersecurity

Currently, most vendors are talking about machine learning and artificial intelligence. But what are they, and what do they do? Machine learning is a branch of information technology that allows computers and other devices to learn new behaviours and changes based on empirical data. 

The main goal is to design and develop algorithms that will allow computers to react to changes and display behaviour learned from their past experiences without human interaction. Since computers are able to learn, it is essential to understand how machine learning and artificial intelligence can benefit...

» Read more
Analysis
Cybersecurity for Hospital Executives – Give Your IT Systems a Health Check
Thumb itsecurityhospital

Data protection is a hot topic at the moment, especially when it comes to the secure storage of sensitive personal information. So what steps can hospital executives take to ensure that their cybersecurity is up to par? 
 

Use the Latest Operating Systems and Software

The older your operating system or software is, the more likely it is to have vulnerabilities. While installing updates regularly can seem costly and time-consuming, it’s still the best way to keep the data stored on your system secure. 
 

Establish Stringent System Access Procedures

Ensuring that...

» Read more
Analysis
How to Build a Water-Tight Cybersecurity Strategic Plan
Thumb cybersecuritymap

As an IT expert in a management position, cybersecurity should be one of your top priorities. Implementing new security measures in your organisation comes with some challenges, but is a big step towards protecting your organisation. Here are tips that can help you to run a cybersecurity project smoothly: 

 

Do Thorough Research before You Start 

It is vital to learn from people with experience in your road to creating a leadership-level security plan. Since you are likely to be the leader of cybersecurity in your company, you will have to study resources from other...

» Read more
Analysis
Benefits of Low Codes Platforms for businesses
Thumb lowcode plattformen

The demand for app developers is growing immensly while there are very few developers available in the market. This has pushed most companies to use low coding platforms to solve the shortage problem with little help from an IT specialist, and create software applications for their businesses. 

 

About Low-codes Platforms 

They are development platforms that allow the creation of application software by only using graphic user interface (UI), instead of the normal programming codes. The platforms allow users to create apps through dragging and dropping...

» Read more

<< Older posts
Loader