Network complexity makes it hard to protect the low-hanging fruit, says Just Eat CISO

Tom Allen
clock • 2 min read

Multiple points of entry, third party contractors, external code and virtualisation make protecting a modern network a difficult task

For a cyber criminal, ‘low-hanging fruit' is all of the information that a business stores without adequate protection. While this is normally limited to non-critical data, sensitive information li...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Tech sector laws: One passes pre-election, another languishes in Lords

Law

UK GDPR will have to wait until next government

clock 24 May 2024 • 3 min read
'Like a stalker': Data broker LiveRamp reported to UK, French regulators

Legislation and Regulation

'This kind of opaque identity monitoring cannot be part of our future digital society'

clock 04 March 2024 • 3 min read

More on Threats and Risks

CISA confirms Windows privilege escalation flaw has been exploited

CISA confirms Windows privilege escalation flaw has been exploited

US cybersecurity agency also added a recently disclosed Google Pixel flaw to its list of exploited vulnerabilities

Kyle Alspach
clock 17 June 2024 • 1 min read
Windows users warned of wireless takeover vulnerability

Windows users warned of wireless takeover vulnerability

Users are advised to update immediately

Penny Horwood
clock 17 June 2024 • 2 min read
Threat group 'systematically compromising Snowflake customer instances'

Threat group 'systematically compromising Snowflake customer instances'

165 organisations notified to date

Kyle Alspach
clock 11 June 2024 • 2 min read