Zero-trust and zero-knowledge pros, Keeper Security, have introduced support for hardware security keys as a single Two-Factor Authentication (2FA) method. Implementing user authentication with only a hardware security key enhances overall security by providing a robust physical second factor, mitigating…
Category: IT SECURITY GURU
New research reveals disconnect between global university education and recruitment standards
New research conducted in the UK and US reveals that over three-quarters (78%) of cybersecurity and IT professionals believe a traditional university education in cybersecurity is not doing enough to prepare graduates for the modern workforce. Meanwhile, nearly two-thirds (64%)…
Salt Security Delivers another Technology Breakthrough with Industry’s only API Posture Governance Engine
Today, API security company Salt Security has announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt Security API Protection Platform. Salt leapfrogs traditional posture management by providing the industry’s first API posture governance…
Nominations Open for The Most Inspiring Women in Cyber Awards 2024
The nominations for the 4th annual Most Inspiring Women in Cyber Awards, sponsored by BT and hosted by Eskenzi PR, have opened. The event, to be held on the 27th February 2024 at the BT Tower in London, will honour…
Closed Door Security Becomes Scotland’s First Chartered Cyber Security Business
Closed Door Security, a leading provider of attack-driven cyber security assessments, today announced its CEO and founder, William Wright, has just been awarded with a Chartership in Cyber Security, turning the company into Scotland’s most highly accredited cyber security firm.…
Bitcoin ETFs Approved Following Official SEC X Account Compromise
For many years, the cryptocurrency industry has waited with bated breath for the U.S. Securities and Exchange Commission (SEC) to finally approve Bitcoin ETFs. Finally, on Wednesday the SEC granted this wish, announcing the approval for “a number of spot…
Critical Security Vulnerabilities Identified in ConnectWise ScreenConnect by Gotham Security Researchers
Gotham Security, an Abacus Group company providing high-quality boutique cybersecurity services, has announced that its research team recently discovered two vulnerabilities in ConnectWise ScreenConnect, saving tens of thousands of enterprises from the possible consequences of a significant cyber-attack. ConnectWise ScreenConnect…
Keeper Security Unveils Granular Sharing Enforcements for Easier Compliance
Today. Keeper Security has announced Granular Sharing Enforcements for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organisations can ensure employees only have access…
Cato Networks Names Cybersecurity Veteran to Lead Northern Europe and Middle East & Africa
Cato Networks, the leader in SASE, announced that Kanwar Loyal has been named Vice President for the SASE leader’s Northern Europe and Middle East & Africa (MEA) regions. Loyal joins Cato from CrowdStrike, where he spent the past six years in…
23andMe shifts blame to users for data breach
The DNA testing company 23andMe has had a rough few months – first reported in October that data had been breached – and now, the response to those breaches due to customers taking legal action against the company. In an…
Q&A: Supporting SOC Teams and Avoiding Burnout
We know that burnout is a problem for many people across the cybersecurity industry. We also know that in order to be the most secure we can be, we have to support those who secure us, whether that’s through burnout…
The best iOS fax app to protect your privacy
Mobile faxing is experiencing a significant surge in popularity, driven by both businesses and individuals seeking paperless alternatives. Unsurprisingly, many are now opting for mobile fax apps. If you’re an iPhone user on the lookout for a mobile fax app,…
VPN to protect against DDoS attacks on Twitch
Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it…
Ho Ho Home For Christmas? Tips For Avoiding Tech Terrors This Festive Season
With Christmas fast approaching, many of us will be hoping to find some new tech under the tree. From innovative gadgets that spark creativity to interactive devices that bring families together, tech toys can add an extra layer of excitement…
2024 Cybersecurity Industry Experts Predictions: Part 1
As 2023 draws to a close, it’s time for cybersecurity experts to gaze into their crystal balls and predict what the next year has set in store for the security industry. In the first part of our predictions round-up experts…
Cyberelements Launches Dedicated MSP Program
Today, Zero Trust Privileged Access Management (PAM) platform cyberelements have launched their Managed Security Provider (MSP) Program enabling partners to increase revenues and deliver a pioneering Zero PAM platform that is set to transform how organisations secure access for standard…
Most API security strategies are underdeveloped. Let’s unpack that.
For attackers, Sun Tzu’s “The Art of War” has guidance on war strategy. For starters, “All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we…
Why a Master’s in Cyber Security is Your Ticket to a Thriving Career
Have you ever wondered who keeps our online world safe from all the bad guys? The heroes who do this have a special kind of training – they have a Master’s degree in something called Cyber Security. It’s like being…
Expanding Reach and Reducing Costs: Cato Enhances Capabilities with Latest Third-Party Integrations
According to Gartner’s projections, by the close of 2024, more than 40% of enterprises are expected to have well-defined strategies for Secure Access Service Edge (SASE) adoption. This is a substantial leap from the mere 1% reported in 2018. Cato,…
Netskope and BT Partner to Provide Secure Managed Services to the Modern Hybrid Enterprise
Today, BT and Netskope have announced a partnership to bring Netskope’s Security Service Edge (SSE) capabilities to BT’s global customers. The partnership follows a number of large customer implementations where the two companies have already collaborated to successfully meet the…
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications
Email is the most common attack vector for cybercriminals, in fact the overwhelming majority (94%) of malware-related security incidents are delivered via email. It’s no surprise that email security is at the forefront of many business leader’s minds. In any case,…
New Synopsys Report Reveals Application Security Automation Soars
Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services,…
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud
A new report by zero-trust and zero-knowledge cybersecurity software providers Keeper Security has found that over 80% of IT leaders (82%) want to move their on-premises Privilege Access Management (PAM) solution to the Cloud. The findings were outlined in a…
Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market
Today, intelligence powered cybersecurity pros Centripetal have announced that their patented cybersecurity threat solution is available for the first time ever across the UK as a result of its strategic partnership with Tiger. Centripetal’s innovative technology is currently deployed by…
Google bins inactive accounts
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…
40% of Cybersecurity Departments Want More Budget to Upskill Employees
According to a new Cyber Security Insights Report by S-RM, in 2023, the average cyber budgets grew to USD 27.10 million, up 3.1% from USD 26.30 million in 2022. S-RM’s research shows that senior IT professionals and their c-suites had…
AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement
Jeremy Hunt, the Chancellor of the Exchequer for the UK, delivered his Autumn Statement of 2023 on November the 22nd to Parliament. In this statement, he outlined the government’s five economic priorities for the upcoming forecast period. These include reducing…
Half of Cybersecurity Professionals Kept Awake By Workload Worries
According to research by the Chartered Institute of Information Security (CIISec), cybersecurity professionals report that the industry is “booming”, but 22% of staff report to work unsafe hours. This research, revealed in the Security Profession Survey 2022-2023, gives an insight…
Cyber Mindfulness Corner Company Spotlight: Pentest People
At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Gemma Gilderdale, Head of People at Pentest People, spoke to the Gurus about Pentest People’s innovative wellbeing support, the future…
Equal Pay Day: Women, Cybersecurity, and Money
Let’s talk about women – and money. Today (22nd November 2023) marks the day that women effectively stop being paid for the year. Stop being paid against their male counterparts for the same work that they do – for the…
Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows
Employee violations of an organisation’s information security policies are as dangerous as external hacker attacks according to a recent study from Kaspersky. In the last two years, 26% of cyber incidents in businesses occurred due to employees intentionally violating security…
Over Half of Organisations Are at Risk of Cyberattack Due to Exhausted and Stressed Staff
Today, new research from Adarma has revealed that organisations believe that they are at significant risk of cyberattacks due to stressed and exhausted staff. The report, entitled “A False Sense of Cybersecurity: How Feeling Safe Can Sabotage Your Business,” highlights…
Cato Networks Named SASE Leader, Again
Today, Cato Networks, announced its recognition as a Leader in both the Frost Radar™: Global SASE, 2023 by Frost & Sullivan and the Market Radar: SASE 2023 by Omdia. “Once again, Cato Networks and our cloud-native SASE platform have been…
Lookout Alerts U.S. Employees and Businesses of Significant Phishing Threat This Week
This week, Lookout, Inc., is warning employees and businesses that phishing attacks across enterprise and personal devices are expected to more than double this week, based on historical data. With more corporate data residing in the cloud today and an…
LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry
New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…
Recognising Scam Patterns and Preventing Data Loss: A Unified Approach
Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…
Understanding the UK government’s new cybersecurity regime, GovAssure
With the ever-growing threat of cyberattacks on the UK government and Critical National Infrastructure cyber safety matters more than ever. With the rising tide of ever-resent threat in mind, GovAssure was launched by the UK government in April 2023. It’s…
Can bcrypt Passwords Be Cracked?
Specops Software, an Outpost24 company, have released new research about bcrypt-passwords – and how easy (or not) they are to crack. This research follows previously released data on how long it takes attackers to brute force MD5 hashed user passwords with…
Top 5 Risks of Artificial Intelligence
Artificial intelligence (AI) technology functions in a manner that helps ease human life. Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Unlike humans, who are…
Centripetal Expands Channel Program With Irish Renaissance Partnership
Today, intelligence-powered cybersecurity pros Centripetal have announced a strategic partnership with Renaissance, the leading Irish value-added distributor in Ireland. This collaboration marks a significant milestone in bolstering Ireland’s cybersecurity landscape and underscores the commitment to combating the rising tide of…
SoSafe Pioneers Personalised Approach to Awareness Training
Security awareness and training company SoSafe has announced the launch of the next-generation of personalised learning. The news was revealed at their Human Firewall Conference earlier this week. This latest innovation aims to make secure behaviour second nature for humans. …
New Synopsys Research Reveals a Decrease in Software Vulnerabilities
Today, Synopsys has released its 2023 Software Vulnerability Snapshot report, showcasing a notable decline in vulnerabilities within target applications. The Synopsys Cybersecurity Research Center (CyRC) analysed the data, revealing a decrease from 97% in 2020 to 83% in 2022. This…
Centripetal Launches Global Partner Program
Today, threat intelligence powered cybersecurity pros Centripetal have launched their partner program to protect organisations around the world by operationalising threat intelligence to safeguard them from every known cyberthreat. The Centripetal Global Partner Program gives organisations the opportunity to implement…
How to Protect Businesses From Holiday Season Cyber Scams
During the Black Friday and Cyber Monday sales this year, Brits plan to spend an estimated £3 billion, with over half of UK adults (51%) planning to splash the cash over the holiday weekend. But it’s not just a lucrative…
The Role of Cyber Wellness in Safeguarding Businesses
As I step out of our London office at lunchtime, I’m bombarded with establishments that promote ‘wellness’ in their description. From the £12 salad bar to the yoga and meditation studio, the nail salon to the library, I’m faced with…
Half of Data Security Leaders Struggle to Keep Pace With AI Evolution
The fourth annual State of Data Security Report by Immuta highlights the current state of data security amid organisations’ rapid adoption of artificial intelligence (AI) and generative AI tools. The report found that most executives (88%) say that their employees…
CAPSLOCK & BAE Systems Course Aims to Tackle the UK’s Cybersecurity Skills Gap
Cybersecurity training company CAPSLOCK and BAE Systems, a global leader in defence, aerospace and security solutions, have launched a new partnership, designed to provide learners with the knowledge and hands-on experience they need to join the UK’s growing cybersecurity sector.…
Netskope Delivers the Next Gen SASE Branch, Powered by Borderless SD-WAN
Netskope have unveiled their Next Gen SASE Branch, a major step forward in infrastructure that uses Netskope’s award-winning Borderless SD-WAN to transform how organisations manage their most critical networking and security functions and optimise enterprise branches everywhere. In today’s digital…
China’s biggest bank hit by LockBit ransomware; US Treasury markets impacted
On November 8th, the Industrial and Commercial Bank of China (ICBC) was impacted by a ransomware attack that disrupted a subset of their Financial Services (FS) systems. ICBC is China’s largest bank with the Financial Services unit based in New…
Outpost24 CORE advancement delivers complete visibility of technology assets and threat exposure
Outpost24 has made significant updates to its offering with the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring. The new module, available as a part of the Threat Compass threat intelligence solution,…
Electric Ireland Confirms Compromise of 8,000 Customers’ Personal and Financial Data
Electric Ireland, an Irish utility company, released an announcement confirming that 8,000 customer accounts containing personal and financial information may have been compromised. Though the exact details of the breach are unknown, the statement explained that “Electric Ireland is aware…
Salt Security Named 2023 CISO Choice Award Winner for API Security
Salt Security, the API security company, has been named the winner of the API Security category in the 2023 CISO Choice Awards. Judged by a panel of distinguished CISOs at large organisations across the world, the CISO Choice Awards honour…
Record number of schoolgirls and cyber specialists to gather amid UK digital skills crisis
On 17th November a record number of Year 8 schoolgirls, government cyber specialists and business leaders will gather at one the UK’s leading cyber hotspots, for what will be the largest ever cybersecurity workshop in the UK. Now in its…
Keeper Security Announces Integration with ServiceNow
Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect…
Bitwarden Revolutionises Online Security with Passkey Management
Bitwarden has introduced a ground-breaking feature: passkey management. This innovation empowers every Bitwarden user to create, handle, and securely store passkeys within their vaults. With the Bitwarden web extension, users can effortlessly and securely access passkey-enabled websites. These synchronised passkeys…
Glasgow Caledonian University Selects CyberArk to Reduce Identity Security Risk for Thousands of Staff and Students
CyberArk has announced that Glasgow Caledonian University (GCU) has selected the CyberArk Identity Security Platform to power its mission-critical identity and access management modernisation initiatives and improve security for its more than 27,000 staff and students. The top-performing modern university…
Remember, Remember: Guy Fawkes and Cybersecurity
In the UK on November 5, we celebrate ‘Guy Fawkes Night’ or ‘Bonfire Night’ often with fireworks and bonfires. Yet, had Guy Fawkes and his conspirators succeeded with the Gunpowder Plot in 1605 to kill King James I and his…
The Future of Encryption: Navigating Change with Crypto-Agility
“Agility” has been quite a buzzword recently. You will likely find it on most companies’ 5-year plan slide decks. Yet, there is one area where the ability to adapt quickly and efficiently makes a lot of sense -cryptography. In an…
Aerospace Giant Boeing Confirms Cyber Compromise, LockBit Claims Responsibility
Boeing, the American multinational corporation most known for the manufacturing of aircrafts, rockets, satellites, and missiles, has confirmed a cyber breach on their systems. Last week, the infamous and prolific ransomware gang, LockBit, announced that “a tremendous amount of sensitive…
Keeper Security Begins Relationship with Ingram Micro to Expand Access to Keeper’s Cybersecurity Solutions
Today, Keeper Security has announced its new relationship with Ingram Micro, Inc. to distribute its products to value-added resellers and technology solutions providers in the United Kingdom, Germany, Belgium, Netherlands and Luxembourg. The relationship with Ingram Micro, a global leader…
Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities
Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined capabilities in partnership with Rockwell Automation, the world’s largest company dedicated to industrial automation and digital transformation. With this expansion,…
What Is Two-Factor Authentication (2FA) and Why Should You Use It?
Ah, the Internet: a treasure trove of memes, cat videos, and—let’s be honest—some stuff you’d rather keep under wraps. Security is crucial, but let’s face it, a password like “Fluffy123” won’t fool anyone for long. So how do you beef…
Don’t Get Spooked Into Falling For These Phishing Scams
Halloween season is here, which means carving pumpkins, trick or treating, planning costumes, sneaking the kids’ candy and scary movies, of course. However, one of the scariest threats facing individuals and businesses alike this spooky season is phishing scams. Much…
Lookout Elevates Strategic Investment in Data-centric Cloud Security
Today, Lookout, Inc. announced enhancements to its Lookout Cloud Security Platform that are designed to help organisations better discover, assess, and protect their data as it moves across any network, from the endpoint to the cloud. These enhancements provide organisations…
Version 1 and The National Museum of Computing Launch New App Using Generative AI Technology to Dramatically Improve Accessibility and Visitor Experience
Version 1, a leading digital transformation partner and The National Museum of Computing (TNMOC), home to the world’s largest collection of working historic computers, today announced the brand new TNMOC Mate application, designed to transform the museum’s visitor experience for…
More than half of mid-sized firms lack confidence in tackling cyber threats finds new report
New research conducted by e2e-assure indicates that a significant proportion of mid-sized companies, approximately 59%, express diminished confidence in their ability to detect cyber threats. This contrasts with just over half of enterprises, where 52% share this concern. Ensuring robust…
Salt Security Discovers Flaws in Social Login Mechanism Impacting Thousands of Websites and Exposing Billions of Users to Account Takeover
Today, API security company Salt Security released new threat research from Salt Labs highlighting API security vulnerabilities uncovered in the social sign-in and Open Authentication (OAuth) implementations of multiple online companies, including Grammarly, Vidio, and Bukalapak. The flaws, which have since been remediated,…
Cato Vice President to Speak About Collaboration on SASE Projects at Gartner IT Symposium/XPO 2023, Barcelona, Spain
Cato Networks announced today that Eyal Webber-Zvik, Cato’s vice president of product marketing and strategic alliances, will be speaking at the upcoming Gartner IT Symposium in Barcelona (6 – 9 November 2023). His talk, “IT Teams Collaboration on SASE Projects…
In Conversation With Ilona Simpson, CIO EMEA at Netskope
Earlier this year, the Gurus caught up with Ilona Simpson, CIO EMEA at Netskope, to talk all things wellbeing in cybersecurity for The Cyber Mindfulness Corner. What transpired during our short Infosecurity Europe interview was that Ilona had a wealth…
Cybersecurity Awareness Month: DTX Recap with SenseOn on “Why SOCS Fail”
Brad Freeman, Director of Technology at SenseOn introduce himself as a security professional with both practical and leadership experience and outlined in his talk the importance of doing the SOC basics right, from a perspective of people and processes. Brad…
Frontier AI Taskforce harnesses industry leaders to research development risks
The UK government’s Frontier AI Taskforce is establishing an AI safety research team that can research and evaluate risks associated with advanced AI development. As set out in its first progress report on 7th September this year, the taskforce is working with various leading tech organisations, including RAND,…
ABS Consulting and Dragos Expand Strategic Partnership to Strengthen OT Defences
ABSG Consulting Inc. a leading global operational risk management company, and Dragos Inc., the global leader in cybersecurity for industrial controls systems, today announced the expansion of their strategic partnership to provide industry-leading operational technology (OT) cybersecurity solutions, services and…
Be On Alert; That HR Email Could Be A Phishing Email!
New research this week has given warning to employees to be on alert to emails seemingly from human resources (HR) as they could be fraudulent. In fact, the findings from KnowBe4’s latest phishing report has highlighted that fraudulent HR emails remain…
This year’s Security Serious Unsung Heroes Awards winners named
Eskenzi PR has today announced the winners of the eighth annual Security Serious Unsung Heroes Awards. The event took place last night at Balfour St Barts in London and celebrated the UK’s cybersecurity professionals, teachers, lecturers, leaders and those working…
Keeper Security Protects Against Supply Chain Attacks with New Open Source Project
Today, Keeper Security has announced a new open source project for software developers and DevOps to easily and securely sign git commits with their Keeper vault. Through Keeper Secrets Manager (KSM), users can now use Secure Shell (SSH) keys stored…
Networking and Security Teams Are Converging, Finds Cato Networks Survey
Today, Cato Networks announced the findings of its 2023 SASE Adoption Survey. The survey of 1,694 IT leaders worldwide finds that management expects networking and security teams to work closer together, if not outright converge. Further survey observations shed light on SASE…
IT Admins Are Just as Guilty For Weak Password Use
New research by Outpost24 has revealed that IT administrators could be just as predictable as end-users when it comes to passwords. An analysis of just over 1.8 million passwords ranked ‘admin’ as the most popular password (with over 40,000 entries),…
Zero to Pentester
It’s rare for a young individual in high school to identify what they want to do for the rest of their life and then carry through with it without ever considering moving out of that field. Rewind to 2013—I’m in…
Cybersecurity Professionals Anticipate Broad AI Integration in Security Operations, Yet Uncertain About Specific Applications
Adarma has released a groundbreaking report titled “A False Sense of Cybersecurity: How a False Sense of Security Can Harm Your Business.” This comprehensive study delves into essential aspects of security operations (SecOps), such as confidence levels, the proliferation of…
Cybersecurity’s Future: Women at the Forefront
The cybersecurity landscape is always changing, and women are increasingly being given a platform to break down barriers and advance in an area that has traditionally been dominated by men. Organisations like CyberWomen@Warwick, and by extension, CyberWomen Groups C.I.C., are…
SMBs Struggle to Keep Pace with Cyber Security Threats
Keeping on top of new threats is the biggest cyber security challenge facing small and mid-sized businesses globally (SMBs) – and more than half are calling for help to manage the risks, new global research by Sage reveals today. UK…
Presenteeism: The Security Risk of Showing Up When You Shouldn’t
Let’s talk about presenteeism. Simply put, presenteeism is when an employee is constantly showing up at work, despite being unwell. In today’s hybrid world, this could mean either physically showing up at the office or logging on at home. As…
No, We’re Not All Going Passwordless
Passwordless authentication methods have been widely spoken about across the cybersecurity and tech industry for years. Offering both hope and fear, a passwordless future has felt imminent for some time. However, an S&P Market Intelligence report report released this week…
The Power of Diversity: Building Stronger Cybersecurity
In an increasingly digital world, cybersecurity has become a critical aspect of our daily lives, with our personal information, financial data, and even national security at stake. However, as the field of cybersecurity continues to evolve, a glaring lack of…
A Third of Brits Give Up on Cyber Security Best Practice
A third (34%) of Brits admit that they have given up following cyber security best practice because it feels like an impossible task, according to new research from Thales. The research, which surveyed over 2,000 UK citizens, found an alarming…
A Third of Brits Give Up on Cyber Security Best Practice
A third (34%) of Brits admit that they have given up following cyber security best practice because it feels like an impossible task, according to new research from Thales. The research, which surveyed over 2,000 UK citizens, found an alarming…
Navigating the intersection of cybersecurity, stress, and risk
According to a 2023 report by Cynet, 94% of surveyed CISOs are grappling with work-induced stress, with 65% admitting to its impact on their organizational defense capabilities. Moreover, approximately 8 in 10 employees note that work-linked stress adversely affects their…
Lookout Named Mobile Security Solution of the Year by the CyberSecurity Breakthrough Awards Program
Yesterday, Lookout, Inc., the data-centric cloud security company, today announced that its Lookout Mobile Endpoint Security solution has won the “Overall Mobile Security Solution of the Year” award in the 7th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a…
5 Tips for Choosing the Best Proxy Service Provider
Selecting the appropriate proxy provider can frequently appear as a challenging endeavor. The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. However, determining the one…
‘No excuses – try harder’: Martha Lane Fox at DTX + UCX Europe challenges tech leaders to double-down on diversity
Baroness Martha Lane Fox has launched a rallying cry for the tech world to invest in diversity as organisations have “no excuses” not to improve representation in the sector. Speaking from the main stage at DTX + UCX 2023, the…
JUMPSEC team inspires local primary school children to consider a future career in cyber-security
Acton-based cyber security company, JUMPSEC, recently visited a local primary school to share how its team protects some of the world’s biggest brands from hackers, malware, and other cyber-attacks. As Ealing Borough’s security partner, JUMPSEC has teamed up with the…
Cybersecurity sector in drive to boost female tech talent
Cybersecurity giants BAE Systems, DarkTrace and GCHQ are on a mission to address the industry’s gender diversity gap by recruiting more female coders during Cyber Awareness Month. Despite cybersecurity being one of the fastest-growing industries in tech, analysis of the…
‘No excuses – try harder’: Martha Lane Fox and lineup at DTX + UCX Europe challenges tech leaders to double-down on diversity and sustainability
Baroness Martha Lane Fox has launched a rallying cry for the tech world to invest in diversity as organisations have “no excuses” not to improve representation in the sector. Speaking from the main stage at DTX + UCX 2023, the…
Outpost24 Expands Leadership Team by Appointing New Chief Revenue Officer
Today, cyber risk management company Outpost24 have announced the appointment of Allan Robertson as Chief Revenue Officer (CRO). Robertson is responsible for overseeing company-wide revenue generation and building an enhanced, integrated go to market approach to accelerate sales and customer…
Keeper Security Becomes a CVE Numbering Authority
Today, password management company Keeper Security has announced that it has been authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). Keeper is the first password management company to join this global effort to…
UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached
Against a challenging economic backdrop and well publicised cyber-attacks, concerns about cyber threats amongst UK small and medium sized businesses (SMEs) have risen significantly in the last year as they consider the impact on brand, reputation, and revenue. According to…
The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals
ISACA, the leading global professional association helping individuals and organisations in their pursuit of digital trust, today launches new research looking at the state of cybersecurity. The research finds that of the cybersecurity professionals who said they were experiencing an…
Threat Hunting with MITRE ATT&CK
Cybercriminal tactics continue to grow in number and advance in ability; in response, many organisations have seen the need to reach a security posture where their teams can proactively combat threats. Threat hunting plays a pivotal role in modern…
Guide to ransomware and how to detect it
The landscape of ransomware has undergone rapid evolution, shifting from a relatively straightforward form of malicious software primarily affecting individual computer users, to a menacing enterprise-level threat that has inflicted substantial harm on various industries and government institutions. Ransomware attacks are strategically…
Research reveals 80% of applications developed in EMEA contain security flaws
Veracode, a leading global provider of intelligent software security, today released research indicating applications developed by organisations in Europe, Middle East and Africa tend to contain more security flaws than those created by their U.S. counterparts. Across all regions analysed,…