The popularity of Bluetooth devices has surged over the years thanks to their convenience and wireless connectivity. The Bluetooth protocol allows and streamlines the setup and discovery of services between a wide range of devices. Bluetooth technology allows users to…
Category: IT SECURITY GURU
Almost All Organisations Experienced API Security Issues in Past Year
The latest State of API Security Report by Salt Security has highlighted the ongoing challenges faced by organisations in securing their application programming interfaces (APIs). The Salt Labs State of API Security Report Q1 2025 draws on survey responses from…
How to Protect Your Digital Identity While Gaming Online
Playing games online provides entertainment but exposes you to specific dangers during gameplay. Hackers and scammers specifically target your personal data, payment specifics, and gaming account information. Cybercriminals steal money and account credentials through phishing attacks, malware, and unsecured systems.…
Cybersecurity Leaders Convene in Belfast to Tackle Evolving Digital Threats
Cybersecurity professionals from across Northern Ireland gathered at Titanic Belfast on February 13 for Check Point Software‘s second Cyber Leader Summit, a high-profile event aimed at strengthening Ireland’s digital defences. The summit brought together government officials, business leaders, and security…
ACDS Unveils New Updates to EASM Platform, Enhancing Security For Enterprises
Advanced Cyber Defence Systems (ACDS) has unveiled various updates to its EASM tool, Observatory. Its new capabilities include an ability to monitor for leaked AWS access and secret keys, as well as a new detection feature for software supply chain…
Keeping DEI on the Agenda: Most Inspiring Women in Cyber Award Organisers Set Panel Topic
Eskenzi PR, organisers of The Most Inspiring Women in Cyber Awards, are proud to announce the theme of this year’s event panel discussion: Keeping DEI on the agenda: progressing, not regressing. The panel topic, informed by ideas submitted by nominators,…
Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour
The common maxim in cybersecurity is that the industry is always on the back foot. While cybersecurity practitioners build higher walls, adversaries are busy creating taller ladders. It’s the nature of the beast. A prime example is multi-factor authentication (MFA),…
How Safe Are Online Entertainment Platforms?
The shift towards online entertainment services in the US can be explained by the proliferation of mobile devices and improved internet access. It is estimated that more than 97% of the US population currently has online access, with 96% owning…
Bridewell and I-TRACING Form Strategic Partnership
Today, I-TRACING and Bridewell, have announced a strategic partnership to create a strategic partnership to create the leading independent European cyber security services provider. The partnership is backed by the founders and managing partners of I-TRACING—Theodore Vrangos, Michel Vujicic, and…
How Secure Are Gaming Transactions: Crypto, Credit Cards, and Wallet Apps Compared
In a consumer survey toward the end of last year, 48% of respondents said they used an e-wallet to pay for items, a jump of 12% from the prior year. This increase suggests a growing desire for safer ways to…
How Q-Day and Security Demands Are Fuelling Cloud Modernisation
The rise of quantum computing is driving the need for cloud modernisation. ‘Q-Day,’ the point at which quantum technology can break current encryption methods in minutes, is looming. With capable quantum systems expected by 2030 and the potential to create…
Cybersecurity Talent Crisis: Future Defenders Rise to the Challenge in CTF Showdown
The UK is facing a cybersecurity talent crisis, with nearly half (44%) of businesses struggling to find professionals equipped to combat the evolving cyber threat landscape, according to the UK Government’s Cyber Security Skills in the UK Labour Market 2024…
RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation
SandboxAQ, MITRE, and The Linux Foundation are pleased to present RWPQC Real World Post Quantum Cryptography (RWPQC) 2025, the third annual conference dedicated to advancing cybersecurity in the post-quantum era. This year’s event will take place on March 24–25, 2025,…
KnowBe4’s Explosive Inside Man Series Back For Season 6
What do data centres hidden under Romanian castles, data mining, deepfakes, fight-scenes, on-screen kisses and AI supercomputers have in common? Security awareness training. Yes, seriously – and that’s just season six of KnowBe4’s The Inside Man. There’s plenty more (five…
Keeper Security Launches Upgraded KeeperPAM
Keeper Security has today announced the next generation of its Privileged Access Management (PAM) platform, KeeperPAM®. The latest update introduces a fully cloud-native solution that seamlessly integrates all privileged access management processes into Keeper’s encrypted vault. This unified approach ensures…
Swipe Left on Scams: Cyber Experts Expose Valentine’s Day Fraudsters
This week marks Valentine’s Day 2025! As the popularity of this romantic occasion has grown, so too have the cyber risks associated with dating, gift-giving, and online transactions. We have gathered insights from cybersecurity experts who share their thoughts on…
National Apprenticeship Week: Alternative Routes into Cyber
As National Apprenticeship Week shines a spotlight on career development opportunities, it’s important to acknowledge that traditional apprenticeships aren’t the only route into the cybersecurity industry. With cyber threats growing exponentially, the demand for skilled professionals has never been higher.…
How Flutterwave Defines Its Growth Strategy
When Olugbenga “GB” Agboola founded the fintech startup Flutterwave in 2016, he articulated a very specific point of view. Instead of adhering to the growth-at-all-costs mindset that animates much of Silicon Valley, his company would pursue expansion only as it…
Safer Internet Day: Cyber Experts Weigh In
Happy Safer Internet Day to all those who celebrate (which should be us all, everyday)! Safer Internet Day, a European Union initiative, launched on 5th February 2004, aiming to promote safer and more responsible online behaviour, particularly among young people.…
Most Inspiring Women in Cyber Awards 2025: Q&A with Lorilee Ressler, Senior Cybersecurity Solutions Architect at Certes
Cybersecurity is evolving at an unprecedented pace, and women are playing a crucial role in shaping its future. As part of the Most Inspiring Women in Cyber Awards 2025, Lorilee Ressler, Senior Cybersecurity Solutions Architect at Certes discussed her journey…