When COVID-19 caused a surge in online and mobile transactions, INETCO needed to quickly identify bottlenecks that were preventing its clients’ customers from accessing their bank accounts and making payments. Bijan Sanii, President, CEO and Co-founder, says INETCO looked at all real-time transactions to identify where every transaction was “getting stuck,” ensuring the stability of customers’ payment transactions across channels, such as mobile, online, ATMs and retail.
As if the pandemic itself weren’t causing enough pain and suffering in the world, cybercriminals are busy developing and deploying COVID-19-related malware to try and take advantage of unsuspecting victims. Fortunately, one of the world’s leading technology companies, Microsoft, is taking action to help people avoid becoming victims of these scams.
Wireless networks makes many business processes very easy, but are they safe? Keep reading to learn! You must know about wireless networks and how they make business communications very easy. As useful as they are, wireless networks are not very difficult to exploit.
Vendor risk management (VRM) is a broad category that encompasses all measures that your organization can take to prevent data breaches and ensure business continuity. Legal issues, past performance, and creditworthiness are some of the common VRM issues that all companies review frequently. Additionally, cybersecurity and the reduction of third-party security risks are increasingly important.
British low-cost airline group easyJet revealed that an hacking incident had exposed approximately nine million customers’ information.
In this final article of our trilogy, we investigate how a cyber threat intelligence (CTI) analyst and associated programmes provide insight about physical and cyber threats to your organisation. The value of these insights is reflected in the wins, which come as a result of context building, holistic understanding, and enhanced awareness in order to outmanoeuvre malicious actor(s).
The digital threat landscape is always changing. This year is an excellent (albeit extreme) example. With the help of Dimensional Research, Tripwire found out that 58% of IT security professionals were more concerned about the security of their employees’ home networks than they were before the outbreak of coronavirus 2019 (COVID-19).
It’s one thing to simulate your disaster recovery and business continuity response; it’s quite another to have to stress test your plan for real and at scale. Recently we chatted with Norman Cave-Browne-Cave, IT & Facilities Manager at Lawton Communications Group, the guy in the hot seat when the lockdown came. The task fell to Norman to maintain business as usual for his team in the UK, US and Australia. Here, he reflects on his experiences.
Everyone at Splunk is very proud of the amazing things that our customers and partners do with their data. It is always extra special when one of those organisations is really doing good and looking after us all in our daily lives. I’m delighted to share one of those stories from the Derbyshire Fire & Rescue Service (DFRS) who is using Splunk as its data-driven SIEM.