Press and Media

During its long history, 1E has received coverage in some of the most distinguished media outlets in the world, ranging from the BBC to the New York Times, CNBC to Forbes. While much of this coverage has naturally concentrated on our ground-breaking products and technical innovation, some has focussed on our philanthropic work, workplace values and innovation-driven entrepreneurship.

press-and-media

338 Press and Media articles

Reset
Under The Radar – How To Thrive In Enterprise Software Without VC Finance
Aug 12, 2018 | Forbes

Under The Radar – How To Thrive In Enterprise Software Without VC Finance

As founder Sumir Karayi acknowledges, digital security company, 1E  has not achieved the same level of industry recognition as some of its larger and often better-funded rivals.  “Not many board members know us as yet,” he admits.

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head
Aug 06, 2018 | Infosecurity Magazine

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

Prevention trumping cure is a such a well-polished truism it can be slightly jarring to learn that the emphasis has lately been undergoing a reversal in the realm of cybersecurity – with “cure” (or, “remediation”) taking growing precedence.

How Leaders Can Give Employees Purpose
Jul 30, 2018 | Forbes

How Leaders Can Give Employees Purpose

“Purpose” is very much a word of the moment in business. Millennials and other younger workers have supposedly been seeking work with purpose for some time and even more experienced employees and managers talk of the need for purpose to differentiate their organizations from other workplaces.

How rogue data puts organisations at risk of GDPR noncompliance
Jul 30, 2018 | Help Net Security

How rogue data puts organisations at risk of GDPR noncompliance

The GDPR compliance deadline came in by force on 25th May 2018 and applies to all organisations processing and holding the personal information of data subjects. This includes contacts such as customers, partners and patients.

Troubled times for security researchers – with suspicion & litigation
Jul 03, 2018 | SC Magazine UK

Troubled times for security researchers – with suspicion & litigation

It’s time a clear code of ethics – extending “responsible disclosure” to include “responsible discovery” – was drawn up or security researchers will become easy targets, enduring litigation with their motives impugned

Stuxnet: A wakeup call?
Jun 26, 2018 | Information Age

Stuxnet: A wakeup call?

Stuxnet is a malicious computer worm, first uncovered in 2010. It targets SCADA systems and is thought to be responsible for damaging Iran’s nuclear program

Tech entrepreneur Sumir Karayi: ‘I went to one of the worst schools in the country’
Jun 01, 2018 | Management Today

Tech entrepreneur Sumir Karayi: ‘I went to one of the worst schools in the country’

The founder of IT firm 1E on failing fast, British innovation and why you can’t beat cyberattacks with high walls.

IBM workers banned from using USB sticks
May 15, 2018 | BBC

IBM workers banned from using USB sticks

Staff at IBM have been banned from using removable memory devices such as USB sticks, SD cards and flash drives. The possibility of “financial and reputational” damage if staff lost or misused the devices prompted the decision, reported The Register.

Planning Your Company’s Win10 move? 3 Ways Applications Could Get in the Way
Apr 30, 2018 | My IT Forum

Planning Your Company’s Win10 move? 3 Ways Applications Could Get in the Way

The majority of businesses today find themselves either in the midst of their Windows 10 migration or planning for it.

Evaluating your infosec defenses: think like the bad guys
Apr 10, 2018 | ITProPortal

Evaluating your infosec defenses: think like the bad guys

Re-examining your infosec policies and defences from the eyes of an attacker can reveal weaknesses in your organisation’s security.

Infrastructure security: Don’t just sit there, do something!
Mar 09, 2018 | Help Net Security

Infrastructure security: Don’t just sit there, do something!

Around 4am on March 28, 1979, things started to go badly wrong deep inside the bowels of reactor number two at Three Mile Island.

After the Meltdown
Feb 12, 2018 | SC Magazine

After the Meltdown

In June last year under conditions of intense secrecy, teams of developers around the world forfeited their holidays to fix three unprecedented vulnerabilities that lay at the very heart of the hardware that powers our computing infrastructure.

Records Per Page