News

Firewalls Or Awareness Campaigns?

Wednesday 27 September 2017

ezembed

Why choose one? It’s amazing how often organisations tend to focus on just one aspect of information security. At Neupart, we encourage organisations to take a more holistic approach. Information security is a journey, not a destination (corny as that may sound), which requires various measures and ongoing processes.

Read more


Patch Flash to Bang – The Need for a Speedy Patching Process

 

Wednesday 27 September 2017

ezembed

When it comes to most things in modern life, we always want them faster. Next day deliveries, better broadband and instant streaming; we want it all, and we want it as soon as possible! Whilst these specific examples of everyday requirements aren’t exactly show stoppers for the most part, what about the “need for speed” in IT Security, specifically the response times between the identification of a vulnerability, and it’s sometimes long-winded required remediation?

Read more


When AI Meets Security

 

Tuesday 26 September 2017

ezembed

What role will artificial intelligence play in cyber security in the future? Will it be used to beat the hackers and consign them to the dustbin of history? Will cyberattacks therefore become a thing of the past, or will hackers harness the power of AI to launch even more sophisticated attacks?

Read more


When is Data No Longer Valuable?

Monday 25 September 2017

ezembed

We should stop using the term ‘big data’. In today’s data driven economy, the moniker ‘huge data’ is much more apt. And it’s going exponential.

Read more


The Problems of Permissive Data Access

Thursday 21 September 2017

Matt Lock – Director of Sales Engineers, at Varonis

Despite heightened awareness of cyber threats, and more budget than ever devoted to cyber security, data breaches are occurring all too frequently. The stream of ongoing reports of wide-scale attacks or massive loss of customer records, give credence to the theory that data breaches are inevitable in our digital age. 

Read more


DUO BeyondCorp: Creating Access Policies

Thursday 21 September 2017

In this post, we’ll talk about creating access policies. Your access proxy takes on the role of enforcing access to corporate resources, regardless of whether they’re outside or inside your traditional perimeter. Enforcement strategy is one way we express risk tolerance; rightsizing those policies depends on factors such as sensitivity, threat, user community, regulatory requirements, and any number of other things. And enforcing policies consistently for both sides of the firewall is a key tenet of the BeyondCorp model.

Read more


Top