Relay Race Image credit Pixabay/Thomas Wolter

In the race to protect data, investment and preparation are key

It should come as no surprise to anyone that investing in cybersecurity and preparing for breaches are determining factors in the outcome of a security incident. It will affect responses from...
Dollar Business : Iage credit PIxabay/Geralt

The democratisation of business valuation

A key benefit of the big data revolution and artificial intelligence (AI) is that it is helping level the playing field between small and large companies. For example, growth businesses have...
evolution Image credit Pixabay/Geralt

Automation – holy grail or security risk?

“Automation often seems like a holy grail for businesses and consumers alike….” That’s the opening sentence to our February 2019 GTIC Monthly Threat Report. This report covers everything from the inherent risks in...
neurons Image credit pixably/geralt

Are you leading with intelligent and boundaryless ERP for a Digital age?

Chances are, your enterprise is already on the path to digital transformation – focussed on leveraging new technologies to cater to changing customer demands.  In the pursuit of a digital experience,...
Cyber security Network Image credit Pixabay/VISHNU_KV

Increasing resiliency by segmenting the OT network based on the Purdue model

This blog post has been developed in collaboration with Poh Chang Chew, Fortinet's Consulting System Engineer in Asia Pacific.  Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are...
Internet finger Image credit pixabay/geralt

SME collaboration delivering effective Public Sector IT security

When Becrypt began developing security technology for government more than a decade ago, relationships with Systems Integrators were the only viable route to understanding and accessing customer requirements. Our experiences today...
Heart Online (Image credit pixabay/Geralt)

Better online than waiting in line

University Hospitals Birmingham Trust wants to curb A&E visits and outpatient appointments When all other medical care options have been exhausted, a person can still turn to the Accident and Emergency Department...
privacy keyboard image credit pixabay/geralt

Data protection v Data privacy: regardless of sector every business is in the data...

Since GDPR came into force companies are still getting to grips with data processes and policies. Joe Collinwood, CEO at CySure explains the difference between data protection and data privacy, which...
Boradroom (c) 2017 Eclipse-USA https://pixabay.com/en/boardroom-city-office-business-3477749/

Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs a large organisation $3.86 million. A separate study found that, although the share price of breach-affected...
Productivity, Imagecredit Pixabay/Geralt

Evolving Mobile Device Management Strategies

As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever-growing device...

LATEST NEWS

Ransomware hits 23 local government entities in Texas

Ransomware hits 23 local government entities in Texas

Ransomware has hit 23 local government entities in Texas. The details of the attack emerged via a post from the Texas Department of Information...
British SailGP boat - Image credit (c) 2019 Bob Martin for SailGP

Applying innovation lessons from SailGP to business

Enterprise Times sat down with John Abel, VP Cloud and Innovation for UK, Ireland and Israel at Oracle on the eve of the Cowes...
Alfa

Alfa blockchain social network/digital sharing launched on Indiegogo

Alfa app and smartwatch intend to foster freedom to create and transact, reward users for their time, protect their privacy, and respect the chronological...
CalGovOps

State of California formalises interest in blockchain

California Government Operations Agency Secretary Marybel Batjer has selected Camille Crittenden, Executive Director of the Center for Information Technology Research in the Interest of...
Two ducks - image credit: unsplash.com-Amir-Abbas Abdolali

Duplication in PowerPoint

How many times do you create a pretty box or object in PowerPoint and need to have exactly the same again and again and...
PTT

Standard Chartered executes Letter of Credit on Voltron blockchain

Standard Chartered Bank has announced the successful execution of a pilot transaction for PTT Group (PTT International Trading Pte Ltd) and IRPC Public Company...
Image by Arek Socha from Pixabay

Considerations when selecting a PSA solution

Enterprise Times sat down with Kevin Roberts, Product Evangelist at Kimble Applications. Roberts joined Kimble recently having spent several years at a competitor. The...
Jenkins World / DevOps World 2019

It’s time for software delivery to be a core business process

As Jenkins turns 15, Enterprise Times caught up with Sacha Labourey, CEO, Cloudbees at Jenkins World / DevOps World to talk about the companies...

Advanced obtains funds for growth

Advanced has announced that Vista Equity partners has sold a share of Advanced to BC Partners. Vista acquired Advanced in 2015 for £750 million....
NTT Security does threat intelligence deal with Europol

NTT Security does threat intelligence deal with Europol

NTT Security has signed a Memorandum of Understanding (MoU) with Europol's European Cybercrime Centre (EC3). The deal sees the two organisations share threat intelligence....
Finboot

Finboot secures Repsol investment after blockchain PoC

Finboot will supply Repsol with its blockchain technology solution BlockLabs after a successful blockchain Proof of Concept (PoC) conducted with the Spanish energy company....
Threat hunting, attribution and identifying what motives threat actors

Threat hunting, attribution and identifying what motives threat actors

Jaime Blasco is the AVP Product Development at Alien Labs, part of AT&T Cybersecurity. At Black Hat 2019, Jaime sat down with Enterprise Times...
Hedera

IBM and Tata Communications join Hedera Governing Council

Hedera Hashgraph, a distributed ledger platform for enterprises, has announced that IBM and Tata Communications have joined the Hedera Governing Council. The Council -...
Construction and Real Estate Image credit Pixbay/MichaelGaida

Deltek to acquire construction accounting vendor ComputerEase

Deltek has further strengthened its grip of the construction software industry with an agreement to acquire ComputerEase. The deal will see Deltek add over...