Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Redscan ThreatDetect Highly Commended at SC Awards 2020

Chosen from a final shortlist of five companies, ThreatDetect was selected for service excellence and, in the words of the judges, for helping organisations ‘to reduce mean time to detect and respond to threats from months to minutes’. “We are delighted to have been recognised in the SC Awards for four consecutive years.” said Redscan’s Product Marketing Director, Simon Monahan.

5 Best Practices for Protecting Data While Working Remotely

As the Coronavirus disrupted the day-to-day lives of billions of people around the world over the last several months, businesses are in the middle of what Time Magazine describes as the “world’s largest work-from-home experiment.” Practically overnight, many companies were forced to adjust their operations by moving millions of workers out of their offices and into their homes.

What are the Elements of an Integrated Risk Management System?

Integrated risk management (IRM) is “a set of practices and processes supported by a risk-aware culture and enabling technologies that improve decision making and performance through an integrated view of how well an organization manages its unique set of risks,” according to research firm Gartner Inc.

Top Cybersecurity threats For seniors

There are around 39.5 million people in the U.S. aged over 65, and a high percentage of them, particularly women (nearly 40%) live alone. Living alone makes seniors more reliant on technology, which can be a savior (think Zoom, Skype and other communication-centered technology) as well as a threat (from phishing to fake antivirus software and bitcoin scams). Are seniors more vulnerable to cybersecurity threats, and if so, what can be done to reduce their risks?

Is it time to consider leaving Symantec Email Security.cloud (MessageLabs)?

With the ever-changing email security market, is now the time to consider leaving Symantec Email Security.cloud (MessageLabs)? Broadcom’s acquisition of Symantec has already caused a trend migration away from Symantec.cloud services according to Proofpoint partner Spambrella. This article explains why Spambrella is attracting Symantec Email Security clients and also explains why you should consider moving to an alternative solution.

116 Must-Know Data Breach Statistics for 2020

Data is rapidly becoming one of the most valuable assets in the modern world. The digital giants that monopolize data are arguably the most powerful companies in the world, prompting ongoing conversations about anti-trust legislation and digital privacy. Despite the overwhelming value controlled by these entities, as we'll see, even companies such as Facebook are vulnerable to the byproduct of the rapid move to digitization – the data breach epidemic.

Cybersecurity Must be an Integral Part of any Pandemic Response Plan from Now On

Sometimes the best way to inform ourselves about how cybersecurity is dealing with a new threat, technology, or situation is to just ask. COVID-19, and the resulting lockdowns, quarantines and economic changes certainly counts as a ‘situation’ for cybersecurity.

How Two Companies Fast-Forwarded Their Work-From-Anywhere Strategy

When the coronavirus pandemic hit, companies had to close offices and transition the bulk of their employees to full-time remote working. Here, we talk to IT leaders from IK Investment Partners and Brookfield Properties about their experiences of pivoting to a fully remote environment at speed – and how they empowered people to stay productive and connected.

Exploring INETCO's Case Management Engine to Speed up Payment Fraud Investigations and Reduce False Positives

INETCO thrives on helping financial institutions deliver an amazing customer experience through optimized transaction performance, faster detection of transaction-level fraud and maximized business value from payment intelligence. Our core competency lies in our ability to decode a wide variety of payment protocols on-the-fly, making comprehensive transaction data ready for real-time analysis.