2016 has barely started, and the world’s biggest technology show has already come to an end. Last week, all people and firms involved in the digital world were watching or – if possible – attending CES (Consumer Electronics Show) 2016, the world’s largest consumer electronics trade show. As always, Las Vegas provided the backdrop as we got a tantalizing glimpse into the future. And like last year, much of the focus centered on the Internet of Things. From smart cars over Belgian drones to fridges becoming family hubs: the digital future promises to be extremely connected. Continue reading
By Albert Kramer
Bring Your Own Device (BYOD) has for the past few years been both a cause of sleepless nights for security bosses and a major flash point between the business and IT. To that we can now add wearable technology – smart watches, fitness trackers, head-mounted displays and the like which threaten to leak corporate data and expand the enterprise risk surface even further. IT consumerisation took another hit this month when research revealed that some of the most popular apps in the world have password brute force vulnerabilities, exposing as many as 600 million Android and iOS users. Continue reading
We all know that it’s getting harder and harder for IT security managers to defend corporate systems. A perfect storm of static or dwindling resources, complex IT environments, a growing attack surface, and the increasing volume and sophistication of threats has made it one of the most difficult jobs in IT. That’s why to the time-poor IT buyer, trusted third-party reports like Gartner’s Magic Quadrant have become regarded as valuable sources of information during purchasing cycles.
Cybersecurity keeps climbing on the list of concerns that keep the IT manager awake at night. And yet this topic is hardly ever, if at all, discussed on the board of directors. How is this possible, and what can we do about it?