Category: IT SECURITY GURU

Keeper Security Launches Biometric Login with Passkeys

Keeper Security has announced the release of biometric login using FIDO2/WebAuthn passkeys on the Chrome/Edge browser extension and Keeper Commander CLI. This update, the first of its kind in the industry, enables users to securely access their Keeper Vault with passkeys…

PPN 01/24: What It Means and How Businesses Can Prepare

In January 2024, the UK Cabinet Office issued a new Procurement Policy Note (PPN 01/24) aimed at strengthening cybersecurity across the public sector supply chain. The policy, which came into effect on 1 April 2024, sets out new requirements for…

Black Duck Debuts GitHub App to Automate Security Scans at Scale

Black Duck has released a new GitHub App designed to make it easier for development and security teams to automate security testing across their repositories. Now available in the GitHub Marketplace, the Black Duck Security GitHub App integrates with Polaris,…

New EMA Research Highlights Keeper’s Strength in Modern PAM

Keeper Security has announced the release of a new global survey report from Enterprise Management Associates (EMA), Beyond the Vault: Elevating Privileged Access Management in the Modern Enterprise. The independent survey and report evaluates eight major PAM platforms and identifies Keeper…

Smishing in the Amazon

In this week’s KnowBe4 scam alert, you receive an unexpected text message that looks like it’s from Amazon. The message claims that an item you bought failed a “routine quality inspection” or has been recalled. The text offers you a…

62% of People Believe AI Agents Are Easier To Deceive Than Humans

A new report by Salt Security (Securing the Future of Agentic AI: Building Consumer Trust through Robust API Security) highlights a critical warning: without proper Application Programming Interface (API) discovery, governance and security, the very technology meant to drive smarter…

KnowBe4 refreshes brand after 15 years

KnowBe4, the cybersecurity platform that comprehensively addresses human risk management (HRM), today unveiled a bold new brand with what it claims to be “an innovative new vision for the future of the company.” The refreshed identity reflects KnowBe4’s leadership in…

SOCRadar Launches Agentic Threat Intelligence Platform

At Black Hat USA, which took place last week, SOCRadar launched SOCRadar Agentic Threat Intelligence. The new platform automates threat intelligence through the deployment of autonomous AI agents that proactively detect, analyse, and respond to external threats with minimal human…

Jen Easterly Joins Huntress Strategic Advisory Board

Jen Easterly, the former Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), has taken up a seat on the Strategic Advisory Board of Huntress. In this new role, she will help drive the company’s innovation efforts, foster key…

Ransomware Payment Bans: Prevention Strategy or Misguided Policy?

It’s no secret that ransomware is on the rise, as this escalation is echoed across numerous industry reports. The Verizon 2025 Data Breach Investigations Report (DBIR), for instance, starkly illustrates this reality, revealing that ransomware (with or without encryption) was…

Salt Security Unveils Salt Surface to Expose Hidden API Risks

API security company Salt Security has announced the launch of Salt Surface, a new capability integrated into its existing API Protection Platform. Salt Surface provides organisations with a comprehensive API attack surface assessment, delivering an attacker’s-eye view of their public-facing…

Check Point CloudGuard WAF Expands in UK With New PoP

Check Point is accelerating its Web Application and API Protection (WAAP) expansion with the launch of new CloudGuard WAF Points of Presence (PoPs) in key strategic markets. The new instance is part of a broader CloudGuard WAF expansion, with additional…

How the EU Is Fighting Back Against Deepfakes

Deepfakes have now crossed the line from science fiction to reality. These AI-generated audio and video forgeries are becoming more believable and increasingly dangerous. From political smear campaigns and celebrity impersonations to scams targeting businesses and individuals, deepfakes have the…

The password that sank a 158-year-old business

The 2023 collapse of the 158-year old UK logistics company KNP resulted in the loss of 700 jobs. The devastating cyber attack that shuttered the company has returned to the spotlight this week with a BBC Panorama documentary examining the…

Majority of CISOs Lack Full Visibility Over APIs

New research by Salt Security has revealed that the majority of CISOs do not have full visibility over their API environments, despite recognition of the growing API attack surface. The 2025 Salt Security CISO Report found that while 73% of CISOs…

Jonathan Zanger Named CTO at Check Point to Boost AI Cybersecurity

Check Point Software has appointed Jonathan Zanger as its new Chief Technology Officer, tasking the former Trigo executive with driving the company’s global cybersecurity and AI strategy. Zanger brings over 15 years of experience building and scaling AI-powered cybersecurity platforms.…

AI Appreciation Day: Celebrating Progress, Embracing Responsibility

As artificial intelligence (AI) becomes increasingly embedded in the fabric of our daily lives, workplaces, and digital infrastructure, AI Appreciation Day presents the perfect opportunity to reflect not only on its transformative power but also the responsibilities that come with…

Empowered employees strengthen financial sector digital resilience

Ensuring that any organisation can withstand, respond effectively to and recover quickly from ICT disruptions is a strategic imperative. This is particularly true within the financial sector. The Digital Operational Resilience Act (DORA), which became mandatory on 17 January this…

Ransomware Attacks Spike Despite Gang Closure

New research from Comparitech revealed that in the first half of 2025, 3,627 ransomware attacks were reported and logged. This is a 47% increase since the first half of 2024, which is highly concerning for major organisations due to the…

How to Secure Your Promo Codes Against Cyber Exploits

Promo codes provide a fantastic opportunity to increase customer traffic and generate sales, yet there is a potential risk with them. Promo codes are one of the objects of interest to cybercriminals because they exploit those codes and use them…

A third of organisations take more than 90 days to remediate threats

The recent Global Industrial Cybersecurity Benchmark 2025 by Takepoint Research, sponsored by Forescout, revealed an overconfidence in critical infrastructure security. Notably, the research found that 44% of industrial organisations claim to have strong real-time cyber visibility, but nearly 60% have…

Infinity Global Services’ Pen Testing Achieves CREST-Accreditation

With today’s unpredictable cyber threat landscape, proactive security measures are crucial. Infinity Global Services (IGS) offers penetration testing (PT), a vital service that uncovers vulnerabilities before exploitation. Delivered by a team of seasoned experts, IGS’s penetration testing service has now…

Bridewell report indicates rise in lone wolf ransomware actors

Bridewell, a UK-based cybersecurity services company, has released its latest CTI Annual Report – a comprehensive deep dive into ransomware trends. It highlighted a significant shift in attack strategies, payment dynamics and threat actor behaviours, revealing that data theft and…

Keeper Security Achieves SOC 3 Compliance

Keeper Security has achieved System and Organisation Controls (SOC) 3® compliance, demonstrating the company’s commitment to the highest standards of security for all users. The SOC 3 report, governed by the American Institute of Certified Public Accountants (AICPA), is a…

US States with Notable Consumer Data Privacy Laws

Privacy issues have garnered significant attention from the state despite not typically being at the forefront of discussions regarding data regulation. The states included in the article are not in any specific sequence. Kentucky Steps Up Early Sectors like entertainment…

Top 5 AI SOC Analyst Platforms to Watch out for in 2025

As threats evolve in sophistication and frequency while cyber skills gaps persist, Security Operations Centres (SOCs) are increasingly turning to AI-driven platforms to enhance threat detection, streamline investigations, and automate responses. But which one is the best? Prophet Security (Best…

Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns

A newly discovered ransomware operation dubbed Fog is raising fresh concerns in the cybersecurity community after researchers found it leveraging a highly unusual mix of legitimate business software and open-source offensive security tools. The campaign, observed in June 2025, is…

APIContext Releases Guide to Enterprise API Readiness for Autonomous AI Agents

In 2025, agentic AI has rapidly moved from theoretical promise to real-world implementation, reshaping the digital infrastructure of enterprises worldwide. These autonomous systems, capable of making decisions, initiating actions, and interacting with APIs at machine speed, are unlocking extraordinary efficiencies…

KnowBe4 Wins Multiple 2025 Top Rated Awards From TrustRadius

KnowBe4, the security awareness training provider, have announced that TrustRadius has recognised KnowBe4 with multiple 2025 Top Rated Awards. KnowBe4’s Security Awareness Training won in the Security Awareness Training category, PhishER won in Incident Response, Security Orchestration Automation and Response,…

High Stakes Privacy: A Guide to Data Security in Gambling

When signing into a real money online casino, your deposits are not the only things at risk—your data is, too. All sorts of sensitive information, ranging from signing up to making a payment, are collected and managed by online gambling…

Can Online Casino Accounts Be Hacked?

Online casino platforms are not immune to compromise, but the most successful breaches don’t happen through the front door. They happen when users bring bad habits to high-risk environments. For hackers, it’s rarely about breaking encryption, it’s about exploiting behavior.…

HostBreach Offers Free Cyber Snapshot For CMMC Compliance Requirements

Philadelphia-based cybersecurity firm HostBreach is offering a free CMMC Cyber Snapshot to businesses looking to maintain CMMC compliance. In particular, this refers to government contractors (GovCon) and federal contractors so they can organise their cybersecurity posture pending the Cybersecurity Maturity Model Certification…

IT Security Guru picks for Infosecurity Europe 2025

With Infosecurity Europe around the corner next week, planning your schedule can be tricky. But never fear! The Gurus have been busy collecting a selection of unmissable events to help you plan your days and ensure you get the most…

Check Point to Acquire Veriti to Transform Threat Exposure Management

Check Point Software has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. The acquisition aims to respond to the uptick in AI-fuelled attacks facing organisations, as well as the…

Finding the right balance between ‘vibe coders’ and security

In today’s digital workplaces, more employees are building their own applications by generating code using Low Code No Code (LCNC), Artificial Intelligence (AI) and Large Language Model (LLM) tools instead of manually writing lines of code. These employees are called…

Keeper Security appoints new CISO

Keeper Security, the cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, is pleased to announce that security industry veteran Shane Barney has been appointed Chief Information Security Officer…

Salt Security Partners With Wiz, Combines Cloud and API Security

API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations to detect, comprehend, and respond to both API security posture gaps…

AI Agents: Transformative or Turbulent?

Described as revolutionary and disruptive, AI agents are the new cornerstone of innovation in 2025. But as with any technology standing on the cutting edge, this evolution isn’t without its trade-offs. Will this new blend of intelligence and autonomy really…

Exploring CNAPP Options for Cloud Security in 2025

Cloud adoption continues to rise, and with it comes increased complexity. Organizations use multiple cloud platforms, creating challenges that traditional security tools struggle to handle. Cloud-Native Application Protection Platforms (CNAPPs) have emerged as vital solutions. CNAPPs offer integrated security across…

How Compliance Training Software Protects Your Business from Risk

The modern business environment exposes organizations to a range of challenges that affect business operations, hence the need for robust regulations. Ignoring standards and guidelines can lead to costly fines, operational disruptions, and reputational damage. Last year, a US court…

WatchGuard transitions new CEO

WatchGuard® Technologies, a provider of unified cybersecurity for managed service providers (MSPs), today announced a planned leadership transition. After a decade of impactful leadership, Chief Executive Officer (CEO) Prakash Panjwani will transition out of his operational role, continuing to serve…

How To Secure Digital Wallets from Phishing Attacks

Digital wallets have become increasingly popular, offering users an easy way to make payments, store cryptocurrencies, and manage their money. But as more people use digital wallets, the risk of cyber threats, especially phishing attacks, has also grown. Phishing is…

MIWIC25: Kiranjit Kaur Shergill, Developer at Barclays

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…

Keeper Security renews Atlassian Williams Racing F1 partnership

Keeper Security, the provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announced a multi-year renewal of its partnership with Atlassian Williams Racing.  “We’re thrilled to continue our synergistic…

MIWIC25: Marine Ruhamanya, Cybersecurity Senior Manager

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…

KnowBe4 Appoints Bryan Palma as President and CEO

KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, announced that cybersecurity industry veteran Bryan Palma has been appointed president and chief executive officer of KnowBe4, effective May 5. KnowBe4’s founder and current chief executive officer Stu Sjouwerman has…

Q&A – Securely Yours: An Agony Aunt’s Guide to Surviving Cyber

What happens when two titans of cybersecurity (Rebecca Taylor, Threat Intelligence Knowledge Manager and Researcher at Secureworks, a Sophos company, and Amelia Hewitt, Founder of CybAid and Managing Director at Hewitt Partnerships) join forces to write a book? Securely Yours:…

SOCRadar Launches AI-Powered Cybersecurity Assistant ‘Copilot’

At RSAC 2025, SOCRadar have unveiled SOCRadar Copilot, an AI-powered cybersecurity assistant designed to enhance platform efficiency, share knowledge and insights, and automate routine security operations. It will help time-strapped security teams to streamline security processes and reporting, all while…

6 Best CMMC Consulting Services for Small Businesses

The best CMMC consulting service for small businesses can help you stay competitive and compliant in the defense space. CMMC — or Cybersecurity Maturity Model Certification — is a security framework developed by the U.S. Department of Defense (DoD) to…

Organisations Unprepared For Age of Quantum Computing

New research by ISACA has found that quantum computing, and the changes it will bring, is broadly welcomed by over half of cyber and IT professionals as a way of creating new opportunities for business. A further 44% believe quantum…