Cybersecurity: Is new technology exploiting or protecting businesses?
Technology Magazine - A BizClik Brand

Cybersecurity: Is new technology exploiting or protecting businesses?

At Technology Magazine we have created a digital community for execs to share their products, learnings and achievements. Our LinkedIn Newsletter brings this month's most influential projects, leaders insights and topics to the forefront.

Cybersecurity: Is new technology exploiting or protecting businesses???

If overcoming the challenges of an economic downturn and the ongoing challenge of the technology skills gap (which we touched upon in our first installment) wasn’t enough, IT and security leaders are now being forced to deal with one cyberattack on average every week.?

As these cyber attacks continue to surge across the industry, a recent study by Rubrik has suggested that 92% of businesses were concerned they’d be unable to maintain business continuity after an attack.?

Rubrik’s study, titled ‘The State of Data Security’ , follows research by SonicWall which found that the top three business concerns of all organisations surveyed were ransomware (91%), Phishing and spear-phishing (76%), and encrypted malware (66%).?

As we discussed last time, the skills gap is having a significant impact on the technology industry, and is especially prevalent in the cybersecurity space. For example, SonicWall’s recent study also found that 46% of organisations feel as though they don’t have enough IT headcount, while a staggering 3% only feel they have more than enough headcount to tackle day-to-day security operations.

“No one is safe from cyberattacks — businesses or individuals,” - Bill (F. William) Conner , Executive Chairman of the Board, SonicWall.?

So, with the increased pressure of daily cyberattacks, what are companies doing to support them selves, their employees and their customers?

Below, we outline companies such as IBM , Vodafone and VMware , who have recently taken strides to reduce both the amount of and the severity of the cyber attacks we are facing today.?

____________________________________________________________

Top news stories?

Study shows the worrying human cost of cyber attacks image

Study shows the worrying human cost of cyber attacks?

Insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs and Directors across 10 countries reveals security risks and widespread damage.?

Read more.

IBM partners with Vodafone on quantum-safe cybersecurity  image

IBM partners with Vodafone on quantum-safe cybersecurity?

IBM and Vodafone have announced a partnership on quantum-safe cybersecurity, aimed at keeping data secure in the face of emerging cybersecurity challenges.?

Read more.

VMware: Lateral security enhancements tackle blindspots image

VMware: Lateral security enhancements tackle blindspots

At a time when security teams are tackling increasingly sophisticated attacks, enhancements in lateral security can shine a light on security blindspots.?

Read more.

____________________________________________________________

5 mins with…?

Tom Kellermann, Senior Vice President of Cyber Strategy at Contrast Security image

Tom Kellermann , Senior Vice President of Cyber Strategy at Contrast Security .?

Prior to this role Tom has held positions as the Head of Cybersecurity Strategy at VMware and Chief Cybersecurity Officer for Carbon Black . He has also served as Wilson Center’s Global Fellow for Cybersecurity Policy and the Secret Service Cybercrime Investigations Advisory Board.?

“We’re currently living in a cyber insurgency, where the cyber space is becoming increasingly hostile and attacks are more destructive than ever before.”

Back in June, we sat down with Tom to discuss all things cyber, find out what he had to say here!

Top 10 Cybersecurity Platforms image

Discover: Top 10 Cybersecurity Platforms

Today, businesses are spoiled with the number of technological solutions at hand, and while these innovations are proving useful for businesses, cyber criminals are also benefiting and using these solutions to their advantage, making cyber attacks harder to defend against.?

As cyber attacks become more complex, it has never been more crucial for businesses to invest in cyber. Below, we take a look at the top companies offering cyber platforms.?

Discover the list. ?

____________________________________________________________

Not to miss: Exclusive interview with…?

Walt Sirene , SAP NS2 ’s R&D and Pre-sales Technical Director, discusses security across the digital ecosystem and driving innovation in cybersecurity.?

Interview with Walt Sirene, R&D and Pre-sales Technical Director at SAP NS2, image

Read the discussion.

____________________________________________________________

Staying one step ahead

As technology becomes more innovative, so do cyber criminals. The risk of cyber attacks will never fully go away, so companies must invest time and money in cybersecurity now more than ever to stay one step ahead.?

____________________________________________________________

About Technology Magazine?

Technology Magazine is a digital media platform for you to showcase products, expertise, learnings, partnerships, and achievements with the world’s largest community of technology executives. Because, as Robert Noyce famously said,

"Knowledge is power. Knowledge shared is power multiplied."

Do this through a magnitude of digital media such as interviews, articles, case studies, videos and webinars. Download the Media Kit for more information.

November edition of Technology Magazine image

Read the latest edition of Technology Magazine.

____________________________________________________________

Thanks for reading?

Thank you for being a part of the technology community we're building! To get industry updates like this more often, sign up to our weekly Technology Magazine Newsletter, here.

In this week's installment, we feature insights from IBM, Vodafone, and VMware, research from SonicWall and Rubrik, Inc., as well as an exclusive interview with Walt Sirene of SAP NS2, and 5 mins with Tom Kellermann of Contrast Security.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了