Today, Cato Networks announced that it was named a “Leader” and “Outperformer” by GigaOm for the second year running. The ranking was listed in the research firm’s Radar Report for Secure Service Access (SSA), GigaOm’s term for SASE. The report’s comprehensive review…
Category: IT SECURITY GURU
Adarma Expands MDR Offering with Integrated Digital Forensics and Incident Response Capabilities
The post Adarma Expands MDR Offering with Integrated Digital Forensics and Incident Response Capabilities appeared first on IT Security Guru. This article has been indexed from IT Security Guru Read the original article: Adarma Expands MDR Offering with Integrated Digital…
Breaking it Down: What You Need to Know About Data Breaches
One of the most pressing cybersecurity concerns for organisations today is preventing the exfiltration of sensitive data. Even companies whose main focus is not digital or technological in nature have to manage, store, send, and receive considerable amounts of data…
Why Schools are Low-Hanging Fruit for Cybercriminals
Hackers are increasingly targeting schools as technology is being integrated more deeply into teaching. Educational institutions own many sensitive data, such as personnel and financial information, as well as intellectual property. Unfortunately, many schools lack adequate cybersecurity measures, making them…
Crack the Code: How to Secure Your Dream Cybersecurity Career
With cyber threats constantly dominating headlines, the draw of a career in cybersecurity has never been higher for young professionals. The huge increase in cyberattacks across various sectors has fuelled a demand for skilled individuals who can safeguard data for…
Six years on from NotPetya: an analysis from Tom Gol, CTO for research at Armis
Six years have passed since the infamous NotPetya cyber attack sent shockwaves through the cybersecurity landscape. Initially disguised as ransomware, NotPetya quickly revealed its true destructive nature, spreading damage to businesses and governments around the world, resulting in billions of…
Cato Networks Revolutionizes Network Security with Real-Time, Machine Learning-Powered Protection
Cato Networks, provider of the world’s leading single-vendor SASE platform, introduced today real-time, deep learning algorithms for threat prevention as part of Cato IPS. The algorithms leverage Cato’s unique cloud-native platform and vast data lake to provide highly accurate identification of…
Zombie API vs Shadow API: The Crashtest
The 1954 novel, “I Am Legend,” played a major role in the development of the modern zombie and vampire genre. As far as the main character, Robert Neville, knows, he’s the last survivor of the pandemic that turned everyone else…
CISO Speaks: Resilience and Avoiding Burnout
We talk a lot in security about ‘burnout’. But we spend a lot less time talking about how to build resilient humans to minimise the risk of burnout… This feels like we have fallen into the same trap with western…
Digital-First Economy Has Transformed Role of CISO
A new global survey by Salt Security has found that a digital-first economy has introduced unforeseen risks for nearly 90% of CISOs. The findings were revealed earlier this week in a new “State of the CISO 2023” report. Conducted by…
More than 1 in 3 UK&I workers are likely to click a phishing link
New research has found over 1 in 3 UK&I workers are likely to click a phishing link, according to KnowBe4’s 2023 Phishing by Industry Benchmarking Report. The report measures an organisation’s Phish-prone™ Percentage (PPP), which shows the likelihood employees will…
Cato Networks Recognized as Global Security Service Edge (SSE) Leader
Cato Networks, provider of the world’s leading single-vendor SASE platform, announced today that it has been awarded the 2023 “Product Leadership Award” by Frost & Sullivan for its Cato SSE 360, a key component of the Cato SASE Cloud platform.…
Cost-of-Living Crisis increasing chances of Insider threats
A new study conducted by CyberSmart has revealed that nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the onset of the cost-of-living crisis. Of these respondents, 38% believe this is due to…
Cost-of-Living Crisis increasing changes of Insider threats
A new study conducted by CyberSmart has revealed that nearly half of UK SMEs (47%) believe they are at greater risk of a cyberattack since the onset of the cost-of-living crisis. Of these respondents, 38% believe this is due to…
New Survey Reveals Critical Data Security Gap In the Financial Services Industry
A recent study from Lookout, Inc., has released new findings that showcase the rise of data breaches in the financial services industry. The report found that 70% of IT leaders surveyed via the Gartner Peer Community reported a significant increase in…
IT Security Guru study shows over one in ten Brits are willing to engage in ‘illegal or illicit’ online behaviour as the Cost of Living crisis worsens
The IT Security Guru, working in conjunction with market research firm Censuswide and cybersecurity PR agency Eskenzi PR, has uncovered some shocking statistics relating to scams and the cost of living crisis. The results of the survey found that 11%…
DTX highlights top 50 innovators driving digital change across the North West
In celebration of the individuals making a massive impact to the digital journeys of some of the region’s biggest organisations DTX has launched its top 50 list for 2023. These are the innovators, the community builders and the unsung heroes…
Synopsys Recognised as a Leader in Software Composition Analysis by Independent Research Firm
Synopsys, Inc. (Nasdaq: SNPS) today announced it has been recognised as a leader in The Forrester Wave™: Software Composition Analysis, Q2 2023. The report identifies the 12 most significant vendors in the software composition analysis (SCA) market and evaluates them against…
Cato Networks Breaks SASE Speed Barrier (Again) With 5 Gbps Encrypted Tunnels to Sites and the Cloud
Cato Networks, provider of the world’s leading single-vendor SASE platform, announced today a new SASE throughput record, achieving 5 Gbps on a single encrypted tunnel with all security inspections enabled. Cato is also simplifying multicloud and hybrid cloud networking and…
Dragos Launches OT Cyber Industry’s Only Global Partner Program to Span Technology, Services, Threat Intelligence, and Training
Today, Dragos Inc. has announced the launch of the Dragos Global Partner Program, the only channel program to comprise OT cybersecurity technology, services, and threat intelligence. The Dragos Partner Program also offers training that prepares partners as experts who can…
Art = Human + Machine
From Jens-Peter Sjöberg, Lord of the Rings CGI artist and co-founder and Creative Director at Swedish video tech pioneers Phyron As a creative and filmmaker, I’ve always been fascinated by the intersection of technology and art. Generative AI models such…
Armis Identifies Riskiest OT and ICS Devices across CNI
Armis has released new research identifying the riskiest devices that pose threats to critical infrastructure industries: manufacturing, utilities and transportation. Data analysed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found that the operational technology (OT) and…
Understanding Neurodiversity in the Workplace to Create a Better Workplace Environment for Everyone
Today, mental health, thankfully, is more widely understood as a vital aspect of overall well-being. It impacts our emotional, psychological, and social functioning. However, for neurodivergent individuals, who possess unique neurological differences such as autism, ADHD, or dyslexia, prioritizing mental…
Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots
This week, it was discovered that cybercriminals had exploited an ongoing vulnerability in Progress Software’s MOVEit file transfer app to infiltrate the systems of payroll company, Zellis. According to its website, 42% of the FTSE 100 are Zellis customers and…
Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted
Research by software delivery platform Harness suggests that UK businesses are inadvertently wasting over £10.4bn per year as a result of lack of software productivity, mainly due to developers having to manually carry out routine operations that could be automated…
Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space
For most organisations and employees, the workplace has transformed over the last few years. No doubt, at least in part, due to the pandemic. For business leaders, it’s harder than ever to work out the best approach to the workplace…
Outpost24 Acquires EASM Provider Sweepatic
Cybersecurity risk management specialists Outpost24 have today announced the acquisition of Sweepatic. Based in Leuven, Belgium, Sweepatic is an innovative external attack surface management (EASM) platform. Gartner identified EASM as a top Security and Risk Management (SRM) trend for 2022.…
J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry
Working in the electrical and data industry, mental health was long an afterthought or even entirely forgotten. It just was not seen as a business priority. Thankfully, that has now been turned on its head and the psychological wellbeing of…
UK Organisations lack clear path to achieve threat intelligence
New research by Armis shows organisations in the U.K. are facing immediate cybersecurity challenges stemming from a heightened regulatory environment, staffing and recruitment difficulties and an expanded attack surface. In this complex environment, threat intelligence has become the top priority on…
Half of UK Employees Suffer From “Sunday Scaries”
In today’s world, there are so many buzz words around work, from quiet quitting to Bare Minimum Mondays. But Sunday Scaries are the latest phenomenon. We all know the feeling: it’s a Sunday evening and Monday morning looms, causing for…
A Roadmap for Becoming a Penetration Tester in 2023
Few areas of cybersecurity measure up against penetration testing in terms of importance and excitement. This activity boils down to finding flaws in computer systems so that organizations can address them proactively and forestall real-world attacks. A pentester worth their…
Salt Security Attains AWS Security Competency Status
Today, Salt Security announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Application Security category. Salt is the only API security company to have earned AWS Security Competency. Having this certification differentiates Salt as an…
Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud
With 12 years of years of patented development and IP innovation, this week, Centripetal announced the launch of CleanINTERNET® CLOUD. The expansion aims to extend protection to enterprise assets anywhere – whether on premises, remote or in the cloud. CleanINTERNET®…
New security model launched to eliminate 95% of cyber breaches
A new security model has been launched this week, dubbed Access Segmentation and Encryption Management (ASEM), which is being touted as the most comprehensive cybersecurity protection available today. The model, which is currently only available through MyCena Security Solutions, addresses…
Tips to Protect Against Holiday and Airline Scams
Summer holidays are fast approaching, and many of us are eagerly planning our vacations. Whether it’s a long-awaited reunion with loved ones, a leisurely exploration of a new destination, or simply an adventure in the making, booking a holiday is…
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool
KnowBe4 has launched its new and complementary QR Code Phishing Security Test (QR Code PST) tool. The no-charge tool assists organisations in identifying users that are most susceptible to scanning malicious QR codes. Many organisations are aware of the typical social engineering techniques used…
Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated
Today, Salt Security released new threat research from Salt Labs that details several critical security flaws in the Expo framework. The flaws were found in the implementation of the Open Authorization (OAuth) social-login functionality utilised by Expo which had the potential to…
Gartner Names Synopsys Leader in Application Security Testing for Seventh Consecutive Year
Synopsys, Inc. (Nasdaq: SNPS) today announced it has been named by Gartner, Inc. as a Leader in the “Magic Quadrant™ for Application Security Testing” for the seventh consecutive year.1 In the report, Gartner evaluated 12 application security testing vendors based on…
How Your Business Could Protect Its Cybersecurity in a Surprisingly Cost-Effective Fashion
Cybersecurity is critical to any company. It helps to protect your organisation, workforce and clients from cyber-attacks. By doing this, you are reducing the chance of identity theft, data breaches, ransomware, and many other types of cyber threats. Your company…
How to Streamline Communication with Microsoft Teams Operator Connect
In today’s modern workplace, clear and efficient communication is essential for teams to work collaboratively and achieve their goals. As remote work becomes increasingly common, it’s more important than ever to have tools that streamline communication and make it easier…
Using Tech For Good: Introducing The Zensory
“We know that there’s a problem within the cybersecurity industry when it comes to burnout – and it’s a problem that’s only getting worse.” That’s what Yvonne Eskenzi, Co-Founder of wellbeing and productivity app The Zensory, has noticed over the…
How to prevent against the 5 main types of insider threats
Over one in ten data breaches originate from a malicious insider, and they cost companies $4.18 million dollars per incident. And that’s only the malicious ones. According to the 2023 Insider Threat Report by Cybersecurity Insiders, nearly three-fourths (74%) of…
Toyota Japan confirms decade-long security breach affecting more than 2M customers
Japanese auto firm, Toyota, recently announced that a decade-long data breach in its online service has compromised information on more than 2 million vehicles at risk. Customers affected included those who signed up for the T-Connect network service between the…
Multiple Vulnerabilities Found in the Kiddoware Kids Place Parental Control Android App
Kiddoware is the world’s leading parental control solutions company with a wide range of products and serving over 5 million families worldwide. Kiddoware is committed in helping you to protect your kids while providing you intelligence to be proactive about…
Time Taken For Hackers to Crack Passwords Revealed
New Specops Software research has unearthed the length of time it takes modern attackers to brute force user passwords. Plain text password storage is rare in these modern times, requiring attackers to adopt password cracking methods to make use of…
Mental Health Awareness Week: Improving Cyber Mindfulness with KnowBe4’s Anna Collard
This week is Mental Health Awareness Week which KnowBe4’s Anna Collard says is the perfect time to pause, take a breath and think about cyber mindfulness. According to research, over half (52%) of people surveyed admitted that stress causes them…
Adarma Announces Management Expansion Amid Rapid Growth
Edinburgh-based Adarma, the leading independent specialist in detection and response services, welcomes three new leaders to its cybersecurity services delivery team. The appointments of Donna Goddard as Head of Security Engineering; Matthew Hmoud as Head of Security Consulting; and Richard…
International Cyber Expo 2023 – Registration is now OPEN
Registration for this year’s International Cyber Expo (ICE) on the 26th and 27th of September 2023 at London Olympia is now open. The award-winning security event will once again showcase an impressive line-up of talks, demonstrations, and senior-level roundtable discussions…
The Future is (Cyber) Mindful
In cybersecurity, a vulnerability is a weakness. It’s a bad thing. Defences must be strong, unbreakable, and hardened against threats 24/7. The same sentiment seems to extend to its professionals, whether we recognise it or not. As a result, a…
Discord Suffers Data Breach Through Compromised Third Party
Popular social media platform Discord has notified users it has suffered a data breach after a support agent’s account at a third party became compromised. A malicious individual then gained unauthorised access to the agent’s support queue, exposing user email…
Risk of cyber-attack “worry” for Eurovision contest
While there is no specific intelligence about an attacked planned for the weekend, experts from the UK’s National Cyber Security Centre have been drafted to help minimise the risk of sabotage. Broadcasters’ main worry suffering an attack from pro-Russian hackers…
Introducing the IT Security Guru’s brand-new cyber mindfulness corner: a peer-to-peer hub full of advice for battling burnout, mental health support resources, and the latest cyber-mindfulness related news. We aim to champion a more mindful industry, alongside professionals who share…
Why Should You Take IT Security Seriously?
The lax attitude to cyber security by a large percentage of internet users never fails to amaze and bamboozle IT security specialists. People seem to have a blasé attitude towards their online safety, probably because they do not believe anything…
Salt Security Achieves AWS WAF Ready Designation
Today, API security company Salt Security announced it is now an Amazon Web Service (AWS) Web Application Firewall (WAF) Ready Partner. This service helps customers discover Partner solutions validated by AWS Partner Network (APN) Solutions Architects that integrate with AWS…
Keeper Security Announces Minority Growth Equity Investment from Summit Partners
Keeper Security has today announced that global growth equity firm Summit Partners has completed a significant minority investment in the Company. With this investment, Len Ferrington, Managing Director at Summit Partners, will join the Keeper Security Board of Directors. The synergy…
the test is here
The post the test is here appeared first on IT Security Guru. This article has been indexed from IT Security Guru Read the original article: the test is here
#World Password Day: Protecting corporate social media passwords
May 4th is World Password Day – a good opportunity for organisations to assess how they’re protecting some of their most overlooked accounts: social media When business leaders consider the role of password security in preventing data breaches, they naturally…
#WorldPasswordDay – Solo, Boba, and Leia among most breached Star Wars passwords
To celebrate World Password Day and #StarWarsDay 2023, Specops Software released findings which observed the commonality of passwords that contained a likely Star Wars character or related term within a password. According to the research by Specops, which analysed over…
Maximising Security in a Digital Age: World Password Day Insights
World Password Day is an annual event celebrated on the first Thursday of May every year. This day is dedicated to raising awareness about the importance of using strong passwords and practicing good password hygiene. The first World Password Day…
European Data at Risk With Tick-box GDPR Compliance and High Cyberattack Volumes
Yesterday, comforte AG released the findings of a survey conducted on over 500 IT Security Specialists and Chief Information Officers across the UK, France and Germany. The research revealed that European IT and security leaders may be dangerously over-confident in…
DTX & UCX Manchester 2023 Agenda goes live
Organisers of the North’s biggest ever digital and IT transformation event on 17th and 18th May at Manchester Central have released further details of the big talking points from local tech leaders and innovators. The Mayor of Greater Manchester Andy…
Häfele Recovers from Ransomware Attack using SASE
Following a well-publicised ransomware attack in February 2023, Häfele was able to recover in record time by moving to Cato SASE Cloud. The international manufacturer and supplier of furniture fittings, architectural hardware and lighting products rebuilt its 50+ country, 180-site…
One Identity Receive Multiple CRN Accolades
Today, systems management, data protection, and software security company, Quest Software and One Identity, part of the Quest family, announced shared success in the 2023 CRN Partner Program Guide. CRN® is a brand of The Channel Company; the CRN…
Charming Kitten Using New Malware in Multi-Country Attacks
Charming Kitten, the infamous Iranian nation-state group, is actively targeting victims across Europe, U.S., India and Middle East with a new malware dubbed BellaCiao. The malware is the latest in their expansive custom tool kit. BellaCiao was discovered by Bitdefender,…
Email Threat Report 2023: Key Takeaways
Every day, countless people across all industries send and receive emails as a significant part of their jobs. Email is often the most convenient and simplest way to get keep in contact with key stakeholders such as co-workers, senior management,…
KuppingerCole Secrets Management Report Names Keeper Security an Overall Leader
Today, Keeper Security announced it has been named an Overall Leader in the 2023 Leadership Compass- Secrets Management report by global information-security analyst firm KuppingerCole. Overall Leaders are identified based on the strength of products, market presence and innovation. KuppingerCole Analysts…
Global Infosec Award Winners Announced at RSA
Yesterday, the winners of 11th coveted Global Infosec Awards were announced at the RSA conference in San Francisco. The awards are run by Cyber Defense Magazine (CDM), who spent six months searching for over 4,300 companies who manage, create and…
Lookout Launches Mobile Endpoint Detection and Response for MSSPs to Help Close the Mobile Security Gap for Customers
Lookout Inc. have announced the release of Lookout Mobile Endpoint Security, a mobile endpoint detection and response (EDR) offering for managed security service providers (MSSPs). This solution enables MSSPs to deliver a complete turn-key program for identifying risk, protecting sensitive…
CyberSmart makes waves in SME cybersecurity market
CyberSmart recently announced a record year of growth, marked by a large funding round, headcount and customer growth as well as geographical market expansion. The company also recently completed its Series B funding round in January 2023 with £12.75 million.…
Cato Networks Introduces Instant RBI Featuring Single-Click Activation
At the RSA Conference 2023, Cato Networks announced the addition of Cato Remote Browser Isolation (RBI) to its Cato SASE Cloud platform. With Cato RBI, enterprises can deliver RBI to all users worldwide in minutes, allowing them to access unclassified…
Outpost24 Appoints New Chief Strategy Officer
Today, Outpost24 announced that it has appointed Brendan Hogan as Chief Strategy Officer (CSO). Hogan is responsible for spearheading M&A Strategy, Corporate Development and Alliance strategy for the company. Hogan has over 20 years of strategy and corporate development experience…
Dragos OT-CERT Celebrates One Year of Service
A year ago, Dragos Inc. released the first cybersecurity resource designed to provide industrial asset owners and operators with free OT-specific cybersecurity resources. Dragos OT-CERT (Operational Technology – Cyber Emergence Readiness Team), was designed specifically to help teams within small…
How to Strengthen your Insider Threat Security
Insider “threat” is a bit of a misnomer. Most insiders aren’t looking to cause harm. At best, they believe they’re cutting through the red tape; at worst, they’re apathetic. Let’s take a common scenario: an employee sends sensitive data…
UK government employees receive average of 2,246 malicious emails per year
Comparitech recently conducted a series of freedom-of-information requests, which found that UK government employees received an average of 2,246 malicious emails each in 2022. The results showed that, across 250 government organisations, Comparitech estimates that 2.16 million government employees received…
Salt Security Announce New Investigation Capabilities to Help API Threat Detection
Salt Security have announced the addition of new advanced threat detection capabilities and improved API discovery to the Salt Security API Protection Platform. Salt now includes richer detection of user intent, analytics to evaluate API threat severity, and rapid investigation…
KnowBe4 Q1 Phishing Report reveals IT and online services emails drive dangerous attack trend
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced the results of its Q1 2023 top-clicked phishing report. The results include the top email subjects clicked on in phishing tests and reflect the shift to IT and online service notifications such…
How to Spot and Avoid Phishing Scams While Gambling Online
Online casinos and other gambling websites have revolutionized how many gamblers play. Whereas gambling used to be restricted to specific physical locations, punters can now freely enjoy a quick betting session regardless of where they are. The opportunities such websites…
Armis Identifies the Riskiest Medical and IoT Devices in Clinical Environments
Armis today released new research identifying the top connected medical and IoT devices that are exposed to malicious activity in clinical environments. Data analysed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found nurse…
Armis Announces Significant Business Momentum in Healthcare
Armis has announced significant business momentum in the healthcare sector driven by healthcare and life sciences companies choosing the Armis Platform to identify and secure their medical devices. Armis has become a critical partner to global healthcare and life sciences…
From Data Breaches and Spyware, to New Cybersecurity Guidelines…
There’s never a dull day in cybersecurity…Below, we round-up some of top stories that hit the headlines this week! A Rough Day for Colonel Sanders While many of us in the UK hit send on our final work email and…
Verimatrix’s Triple-Threat Initiative Enhances Mobile App Security
Research estimates that the average smartphone user has 80 apps on their device, and many companies leverage their own app to communicate with customers. In light of this, it has become critical that due attention is given to maintaining the…
Enhanced Threat Intelligence Technology Announced by Outpost24
Today, Outpost24 announced the release of a new Vulnerability Risk Management solution, Outscan NX. The utilisation of threat intelligence-led vulnerability prioritisation technology (VPT), along with automated network and cloud security assessment, provides a risk-based approach to vulnerability management that cuts…
Synopsys’ Next Gen Polaris Software Integrity Platform Levels Up Application Security Testing
Synopsys has announced it will showcase the Fast Application Security Testing (fAST) offerings that represent the latest capabilities and features of the Polaris Software Integrity Platform® at RSA Conference 2023, April 24-27 in San Francisco. Synopsys fAST Static and Synopsys…
New Research Highlights Increased Security Risks Posed by Remote Working and BYOD
New research released by Lookout, Inc. the increased number of growing threats associated with remote work and bring your own device (BYOD) policies faced by organisations. The State of Remote Work Security aims to help raise awareness amongst IT and…
For Cybersecurity, the Tricks Come More Than Once a Year
Anyone who pays attention on April Fool’s Day has learned to think twice about the information they read, the links they receive and the people who try impersonating others. The irony, though, is that while we’re hypervigilant against these harmless…
Only 10% of workers remember all their cyber security training
New research by CybSafe found only 10% of workers remember all their cybersecurity training. This is exposing companies to cyber risk. 1000 US and UK office workers told CybSafe about their cybersecurity training. Half of employees get regular security training…
New API Report Shows 400% Increase in Attackers
Today Salt Security have released the findings from their latest Salt Labs State of API Security Report, Q1 2023, which found that there has been a 400% increase in unique attackers (over 4800) in the last six months. The report…
Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis
Today, Cato Networks has been named the Leader in the Single-Vendor SASE Quadrant Analysis published in TechTarget. “We’re honoured to be identified as the Leader in single-vendor SASE market,” says Shlomo Kramer, CEO and co-founder of Cato Networks. “Cato introduced the…
Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries
As important as it is, cybersecurity awareness training might not seem like the most exciting thing in the world, but when it involves plots to rival your favourite network crime dramas, expertly crafted cinematography, and characters to root for? Naturally,…
New Research Examines Traffers and the Business of Stolen Credentials
Today, Outpost24 released a new report revealing the underground operation of Traffers, cybercriminal organisations reshaping the business of stolen credentials. The Rising Threat of Traffers report, compiled by Outpost24’s Threat Intelligence team, KrakenLabs, provides a deep dive into the credential…
How to Succeed As a New Chief Information Security Officer (CISO)
As cyber threats increase in frequency and complexity, organizations recognize the importance of having a Chief Information Security Officer (CISO) to protect their sensitive data and infrastructure. To succeed as a new CISO, it’s essential to clearly understand the…
The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age
The Covid-19 pandemic has changed the world significantly. Businesses have now realized that the world needs to be digitized. It is mainly why the trend of brick-and-mortar stores is nearly over and businesses are now switching to digital modes, creating…
Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed
Cymulate, the leader in cybersecurity risk validation and exposure management, today released the company’s “2022 Cybersecurity Effectiveness Report” which analyzed the results of over a million security posture validation assessments, including 1.7 million hours of offensive cybersecurity testing within Cymulate’s production environments. The report…
Synopsys discover new vulnerability in Pluck Content Management System
Software security company Synopsys have discovered a new remote code execution vulnerability (RCE) in the Pluck CMS system. Pluck is a content management system (CMS) implemented in PHP designed for setting up and managing your own website. Devised with ease…
Dole confirms employee data was breached following February ransomware attack
This week, Dole Food Company revealed that hackers behind a February ransomware attack have accessed the data of an undisclosed number of employees. “In February of 2023, we were the victim of a sophisticated ransomware attack involving unauthorized access to…
MyCena Improves Customer Data Access Protection in Call Centers and BPOs
MyCena Security Solutions today announced the addition of a new feature to its MyCena Desk Center (MDC) platform, designed to stop credentials theft, fraud and social engineering in call centers, Business Process Outsourcing (BPOs) and customer service centers. Customer service…
Fortune 500 Company Names Found in Compromised Password Data
New research released by Specops Software outlines the most common Fortune 500 company names that show up in compromised password data. The Specops research team analysed an 800 million password subset of the larger Breached Password Protection database to obtain these…
Ferrari Data Breach: The Industry has its say
Apparently, the team at Ferrari may not have been up to speed with the latest ways to ensure your security is top priority. It was announced on Monday via a statement uploaded to their website that Ferrari was “recently contacted…
What Is Observability, And Why Is It Crucial To Your Business?
The software of your business – and its protection – is crucial if you want to succeed in the business landscape. Around the world, as many as 30,000 businesses are hacked every day, with 64% of companies also experiencing a…
How Emerging Trends in Virtual Reality Impact Cybersecurity
As information technology continues to evolve, more and more people are penetrating cyberspace. Most organizations, companies, individuals, and even governments are now doing their activities in the digital world. This allows them to enjoy great benefits such as instant access…