Futurum Analyst Michael Diamond explores how the TeleSign Silent Verification offering will help eliminate headaches for businesses and consumers using their smartphones to authenticate into online retailers, social media, healthcare services and more — and why that matters.
Biden Administration Appeals to Big Tech to Raise the Bar on Cybersecurity
Futurum Research Senior Analyst, Steven Dickens provides his take on the focus by the Biden Administration over the last few months and the meetings on Capitol Hill last week to address recent security breaches. With Big Tech being summoned to engage with the administration against a backdrop of cyberattacks and ransomware incidents becoming more high profile and frequent, a coordinated government and private sector response is becoming increasingly called for by a bi-partisan coalition of lawmakers.
Full Impact of REvil Ransomware Attack on Kaseya Becomes Apparent
Futurum Research Senior Analyst Steven Dickens provides his analysis of the most recent supply chain ransomware attack that has affected thousands of businesses globally over the July 4th weekend.
HPE’s Project Aurora Launches, a New Zero-Trust Offering to Help Address Security Concerns
Futurum Senior Analyst Steven Dickens provides his take on news coming out of HPE’s Discover event around the latest zero-trust solution, Project Aurora. As the cybersecurity landscape evolves, new approaches are required to combat the emerging threats. HPE’s zero-trust approach is designed to deliver robust attestation and verification derived through a root-of-trust model at the silicon layer.
Overlooked Groups for Security Awareness Training
To keep your company as safe as possible, it’s important to consider the groups that are most often overlooked when it comes to security awareness training.
Why Building a Security First Culture is Business-Critical
In the smart, connected, and increasingly automated landscape businesses operate in today, the risk of exposure of sensitive data or infiltration by cyber criminals is becoming ever more prevalent. The increasing use of cloud services and third-party integrations are exposing companies to risks with the potential to disrupt operations, erode consumer trust, and ultimately damage business reputations to the detriment …
Why People + Machines Will Be the Key to the Future of Work
When it comes to artificial intelligence (AI), machine learning, and robotics, there are generally two main schools of thought, especially when it comes to these technologies serving as the key to the future of work. The first is that AI will take over humanity—perhaps even violently—and all of us will be forced into redundancy due to machines that eventually become …
Fifty Percent of Businesses Report Ransomware Attacks in Past Year
In 2016, ransomware was one of the most successful forms of cybercrime. And in 2017, that continues to be the case. Ransomware has affected a reported half of all businesses in the last year, with many having been hit more than three times already. That sobering statistic comes from the Global Ransomware Study 2016 from Sentinel One, which suggests a …
How Signing Emails Can Help Keep Your Company Secure
On average, business users send and receive 42 emails per day via a number of devices, including smartphones, tablets, and desktop computers. All that online activity is inviting to hackers, which is why phishing and malware attacks are common in office email breaches. Are the email accounts in your office protected? We’ve discussed cyber security in the past, including strategies …
Enterprise IT Reality: Cyberthreats and Security Fears
Today’s enterprise IT teams are largely kept awake at night focused on cyberthreats and security fears. That’s very different, though, than what tech teams have focused on in the past. Consider this: In November 1988, the world was introduced to the first widespread computer bug. The virus caused thousands of machines to crash and resulted in damage that was well …