Enterprise

Demystifying enterprise blockchain

While last year’s hype surrounding cryptocurrency may have died down, the distributed ledger technology that underpins digital currencies is seeing renewed interest from businesses. Blockchain is currently being used in the enterprise to help secure sensitive data and to make sure that only users with the right credentials have access to it.To learn more about enterprise…


While last year’s hype surrounding cryptocurrency may have died down, the distributed ledger technology that underpins digital currencies is seeing renewed interest from businesses. 

Blockchain is currently being used in the enterprise to help secure sensitive data and to make sure that only users with the right credentials have access to it.

To learn more about enterprise blockchain,TechRadar Prospoke with Gospel Technology’s founder and CEO Ian Smith.

  • How blockchain will herald a new era of security for your business operations
  • A look at the vital role blockchain is playing in banking the unbanked
  • HSBC says it has completed $250bn FX trades using blockchain

How is enterprise blockchain disruptive?

In today’s highly competitive business landscape, collaboration is essential to maximising opportunities. However, the risk of sensitive information falling into the wrong hands or cyber criminals exploiting loopholes in security processes means businesses are being overly cautious. For many businesses, this has meant deploying zero-trust solutions which restrict access negatively impacting business agility and collaboration.

Enterprise blockchain, distinctly different from the blockchain used by cryptocurrency vendors, is underpinned by Distributed Ledger Technology (DLT), specifically designed to address the issues above by providing a secure perimeterless security infrastructure, which should provide access to data to individuals or groups based on consent and credentials. It should ensure that businesses retain control of their data once it’s shared internally or externally. This architecture creates a data network of trust for secure data collaboration—both between employees within an enterprise (intra-enterprise) and between enterprises and partnerships (inter-enterprise). 

Image Credit: Pixabay

Image Credit: Pixabay

(Image: © Image Credit: The Digital Artist / Pixabay)

What value and benefit does it provide?

One of the main benefits of a secure data platform underpinned by DLT is that it allows for the scalable generation of trusted data in a perimeterless security infrastructure, creating a single version of data truth across all parties. Businesses can retain control of their data once it’s shared, providing flexible access b

Read More

Be the first to write a comment.

Leave a Reply

Enterprise

Bots try to break the internet, and other trends for 2019

From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation (GDPR) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry. With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this…


From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation (GDPR) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry. 

With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this year is how crucial it is to stay one step ahead of cybercriminals at all times. In order to continuously protect company and customer data, businesses need to have an understanding of not only cybersecurity threats now, but also in the far future.  

Although no one can say for certain what 2019 will bring, we can look to the past to understand the trends of tomorrow. As technology has evolved, it’s been accompanied by smarter, more malicious and much harder to detect threats. With the ever-increasing intelligence of bots, the increasing complexity of clouds and rising IoT risks, as well as the impact of data regulations, cybersecurity will dominate boardroom conversations. 

  • Keep your devices protected from the latest cyber threats with the best antivirus
  • Browse public Wi-Fi securely with the best VPN
  • This is everything you need to know about GDPR

With this in mind, here are eight trends that will make the year ahead as turbulent as the one just passed:

Cyber-attacks will grow – and go slow 

Organisations will see an increase in cyberattacks but these will be “low and slow”, rather than “noisy” incidents such as DDoS attacks. Launched by botnets, “low and slow” attacks aim to remain under the radar for as long as possible, to steal as much data as they can. 

Often these take the form of credential stuffing attacks, where stolen credentials are used to access associated accounts and steal further personal data such as addresses and payment details. 

To protect themselves, businesses will need to adopt bot management solutions, which identify, categorise and respond to different bot types. The technology uses behaviour-based bot detection and continuous threat analysis to distinguish people from bots. 

Image Credit: iStockPhoto

Image Credit: iStockPhoto

Bots will overtake human web traffic 

As bots become more sophisticated, they will be responsible for more than 50% of web traffic. Already, Akamai has found that43% of all login attemptscome from malicious botnets – and this is set to increase as credential stuffing and “low and slow” attacks grow in popularity. 

More sophi

Read More

Continue Reading
Enterprise

Shadow IT: It’s time to reign in the rogues

Shadow IT (also known as rogue, or stealth IT) is hardware and software that is used within an organization without explicit approval from management.  The guilty parties fuelling the rapid proliferation of Shadow IT are less roguish than you might imagine however and include everyone; from C-suite executives at the pinnacle of an organization, to…


Shadow IT (also known as rogue, or stealth IT) is hardware and software that is used within an organization without explicit approval from management.  

The guilty parties fuelling the rapid proliferation of Shadow IT are less roguish than you might imagine however and include everyone; from C-suite executives at the pinnacle of an organization, to new interns uploading their first notes on Google Drive. 

Downloading cloud services has never been easier, plus more devices than ever are being used to house the extensive pick-a-mix of solutions and tools, including smartphones, tablets, and even smartwatches. What’s worrying for company Chief Information Officers is that many of these devices, used for both personal and business use, are connecting to corporate networks. More painful still is the fact it’s the apps that are designed to increase productivity that are especially vulnerable, reports Cisco. Of the 900 organizations the technology conglomerate surveyed, 27% of the apps being used were classified as ‘high risk’. 

  • Protect your devices with the best antivirus
  • Keep your endpoints safe from growing cyber threats with the best endpoint protection
  • Browse the web securely on the go with the best VPN

“Most users don’t realise or expect professional tools to be a target for cyber-criminals, however these apps often demand quite a lot of information and frequently require email accounts to work. This makes them the perfect vector for security breaches,” explains Mark Adams, Chief Customer Officer at cloud enterprise software company, Cloudmore.  

Research group Gartner estimates that by next year (2020

Read More

Continue Reading
Enterprise

Apple rescinds Facebook’s enterprise developer certificate after latest scandal

UPDATE: In our original story below, we mentioned that Facebook was negotiating with Apple to have its enterprise credentials restored. According to Bloomberg reporter Sarah Frier, that has come to pass and a Facebook spokesperson has confirmed that the social media platform is working to get the internal apps working again.Original story…Despite the odd hiccup,…


UPDATE:In our original story below, we mentioned that Facebook was negotiating with Apple to have its enterprise credentials restored. According to Bloomberg reporterSarah Frier, that has come to pass and a Facebook spokesperson has confirmed that the social media platform is working to get the internal apps working again.

Original story…

Despite the odd hiccup, over the last couple of years Apple has become a strong proponent of safeguarding user privacy. Facebook, it seems, didn’t get the memo.

Immediately following the news that the social media giant paid users to install a “research” app that tracks and records phone and web activity, Apple revoked Facebook’s enterprise developer certificate. This countermand means Facebook’s internal iOS apps, including those used by employees for food and transportation, have been blocked.

The Verge reports that beta versions of Instagram, Messenger and WhatsApp have stopped working, and that “Facebook is t

Read More

Continue Reading
Enterprise

Best encryption software tools of 2019: Keeping your data secure and private

If you’re looking for the best encryption software for your needs in 2018, then you’ve come to the right place, as we’ve listed the top software that will keep your important files and documents safe from malicious users.The sad fact is that as hackers are become ever more adept at stealing private information, we must…


If you’re looking for the best encryption software for your needs in 2018, then you’ve come to the right place, as we’ve listed the top software that will keep your important files and documents safe from malicious users.

The sad fact is that as hackers are become ever more adept at stealing private information, we must be ever more vigilant when it comes to protecting our files, regardless of if we are a business or home user, and this is where our list of the best encryption software of 2019 comes in.

Encryption tools encode data so that it can only be unlocked with a certain key, making it harder for third-parties to gain access. This means that only people who have access to that key can also access the data, making encryption software an essential tool for keeping data safe.

These encryption tools can be used to protect data such as email addresses, customer transactions and passwords, and other crucial information which you really can’t afford to potentially expose. Many companies are also using encryption software to ensure internal online conversations and emails are kept private.

So which are the best encryption tools? Read on for our pick of the very best tools for keeping your data safe.

  • This is our best antivirus buying guide

VeraCrypt

1. VeraCrypt

Free encryption for everyone

Platforms:Windows, macOS, Linux |Resources covered:Encryption and brute-force attack protection |Cloud-based:No |Integrations:No |Free trial:N/A

Basic version is completely free
Provides effective encryption
Selective approach
Initial download is a bit confusing

VeraCrypt is one of the most popular security tools, providing you with enterprise-grade encryption for important data.

The system is quite easy to use, and all it really does is add encrypted passwords to your data and partitions. All you have to do is give the tool a few details about your data, such as volume size, location and specified hashing algorithms – and then the program does its thing.

What’s also nifty about VeraCrypt is that it’s immune to brute-force attacks, so you never have to worry about hackers decrypting your passwords and other sensitive data. The basic version of the software is completely free, as well.

  • Get hold of VeraCrypt here

AxCrypt

2. AxCrypt

Encryption for small teams and individuals

Platforms:Windows, macOS |Resources covered:Encryption, password protection, mobile apps |Cloud-based:Yes |Integrations:Google Docs, Dropbox |Free trial:30 days (fully free version also available)

Strong encryption for personal use
Free version available
Mainly mobile-oriented

While free software can be convenient for some, it’s not always as powerful as premium offerings, and AxCrypt is a good bet if you want something reliable. Th

Read More

Continue Reading