Today, Keeper Security have announced the appointment of Dr. Chase Cunningham to its Public Sector Advisory Board. Cunningham’s appointment reflects Keeper Security’s commitment to zero-trust security. Keeper’s early adoption of zero-trust architecture has become a model for national security and…
Category: IT SECURITY GURU
Cyber gaps in the supply chain — Bank of America breached in another vendor cyberattack
Third-party cyber-attacks remain one of the most significant threats facing organisations across the globe. Most recently, Bank of America, a multinational investment banking and financial services corporation, began notifying customers that a November 2023 hack against one of its service…
The Channel can help SMEs protect themselves from increasing security threats
Recent reports indicate that SME resellers specialising in security are optimistic about the future, expecting a better year ahead than the challenges they faced in the previous 12 months. With increasing cyber threats and the need for secure and reliable…
Own Company Unveils New Channel Partner Program
Own Company, a leading SaaS data platform, today announced the launch of a global Channel Partner Program aimed at empowering resellers and system integrators to proactively prevent their customers from losing mission-critical data and metadata. With automated backups and rapid,…
Quantum computing: The data security conundrum
One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven…
Verizon Breach – Malicious Insider or Innocuous Click?
A household name among American media companies, Verizon Communications on Wednesday began notifying employees that an insider may have gained access to their data. According to the breach notice to the Maine Attorney General, an unauthorized employee opened a file…
Keeper Security Available on Apple Vision Pro
Password manager Keeper Security announced this week that users can log in to applications on the new Apple Vision Pro™ with Keeper, providing secure and seamless access to content on the revolutionary new device. As spatial computing becomes a reality…
Centripetal and Platform 94 Join Forces to Bring Cybersecurity Defence to Irish Companies
Almost one in five Irish firms experienced a significant cyber attack or data breach in 2022, according to research by Aon. It’s no wonder that Irish businesses are concerned about cybersecurity, with ever evolving threats and new and novel attack…
Safer Internet Day: Cybersecurity Experts Weigh In
Happy Safer Internet Day to all those who celebrate! Cybersecurity experts from across the industry have weighed in on how we can use the internet in a safer way, both professionally and personally, in an age of increasing attacks and…
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages, SenseOn research reveals
The majority of large enterprises spend an average of 3-5 months integrating and training teams on each new security solution – at the expense of threat hunting, vulnerability scanning and security awareness training However, major contradictions are rife, with 76%…
ThinkCyber and Plexal Join BT as Sponsors of The Most Inspiring Women in Cyber Awards 2024
Eskenzi PR are proud to announce that ThinkCyber, the innovators of measurable secure behaviour change with their Redflags® software, and Plexal, the innovation company solving society’s challenges through collaboration with government, start-ups and industry, have joined BT as sponsors for…
A Comprehensive Overview Of Nanotechnology And Applications Of Nanotechnology
What Is Nanotechnology? Nanotechnology is concerned with nano-scale materials and structures. Nano-scale refers to particles and devices that are less than 100 microns in size. A sheet of paper has a thickness of 100,000 nano-meters, while a person who stands…
What is HTTP Request Smuggling and HTTP/2 Downgrading?
Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result…
Salt Security Joins AWS Lambda Ready Program
Today, API security company Salt Security has announced that it has been accepted to the Amazon Web Services (AWS) Lambda Ready Program. Salt now supports and simplifies deployments to AWS Lambda, allowing customers to capture API traffic flowing through serverless environments…
AI-Powered Attacks and Deepfake Technology Fuel Cyberattack Concern
Today, password security pros, Keeper Security have released the key findings from its latest survey about the state of cybersecurity and the burgeoning threats that are keeping cyber professionals up at night. The survey of more than 800 IT security…
Introducing meaningful AI features for information security in 2024
Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. He explains why his company is focused on developing AI tools that deliver benefits over media buzz. There’s been a…
Ransomware Research Reveals Millions Spent Despite Do Not Pay Policies
Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals the majority of companies are paying ransoms and breaking their ‘do not pay’ policies. The research polled from over 900 IT and Security decision-makers, 301 from the…
SAS joins fight against cybercrime as NCRCG National Ambassador
This week, the National Cyber Resilience Centre Group (NCRCG) – a strategic collaboration between the Home Office, policing, academic and National Ambassador partners – has welcomed AI and analytics leader, SAS, on board as a National Ambassador. In taking up…
Navigating the Landscape of Advanced Email Security Threats with Optimism
In the contemporary digital era, email remains one of the most predominant forms of business communication. With its unrivalled efficiency and ubiquity, email bridges gaps between organisations and their global workforce, facilitating seamless collaboration. However, this prevalence has also placed…
Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment
For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure them have existed. Manufacturing, agriculture, critical national infrastructure, and healthcare to name but a few,…