Acronis CISO outlines how it is helping its customers combat cyberattacks

CNME Editor Mark Forker spoke to Kevin Reed, CISO, at Acronis, to discuss how the security landscape has evolved since the onset of the COVID-19 pandemic, the concept that security is everybody’s responsibility – and the role Acronis is playing in terms of equipping its customers with the solutions to combat cyberattacks following the move to remote working.

CyberSiara use unique characteristics of the human eye to tackle cybercriminals

CNME Editor Mark Forker managed to secure an exclusive interview with Dr. Mohammad Reza Beheshti, Founder and CTO at CyberSiara, and Neil Shah, CEO at CyberSiara, to find out how their incredible solution based on the unique characteristics of the human eye is leading the fight against cybercriminals targeting online forms and captcha technology.

Targeted email attacks on the rise

According to Kaspersky researchers, another targeted threat to watch out for is corporate doxing, the process of gathering confidential information about an organisation and its employees without their agreement, to harm them or profit from it. Proliferation of publically available information, data leaks and advancement of technology are leading to a state in which tricking employees into giving out confidential information or even transferring funds is becoming easier than ever before.

XDR: A Cybersecurity Game-changer

Today’s organisations require the ability to autonomously secure all enterprise data – security related or not. This is exactly where enterprises can benefit from adopting XDR, an integrated platform that provides visibility and automated defences required across all assets.

Service Accounts – Challenges and Best Practices

Service accounts are a particular type of non-human privileged account used to execute applications and run automated services, virtual machine instances, and other processes. These accounts can be privileged local or domain accounts, and in some cases, they may have domain administrative privileges. This high level of privilege facilitates the smooth operation of many IT workflows, but a single service account can easily be referenced in many applications or processes. This interconnection, along with the critical nature of their usage, makes them very difficult to manage.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines