Category: IT SECURITY GURU

Keeper Security Adds Support for Hardware Security Keys as Sole 2FA Method

Zero-trust and zero-knowledge pros, Keeper Security, have introduced support for hardware security keys as a single Two-Factor Authentication (2FA) method. Implementing user authentication with only a hardware security key enhances overall security by providing a robust physical second factor, mitigating…

Keeper Security Unveils Granular Sharing Enforcements for Easier Compliance

Today. Keeper Security has announced Granular Sharing Enforcements for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organisations can ensure employees only have access…

23andMe shifts blame to users for data breach

The DNA testing company 23andMe has had a rough few months – first reported in October that data had been breached – and now, the response to those breaches due to customers taking legal action against the company. In an…

Q&A: Supporting SOC Teams and Avoiding Burnout

We know that burnout is a problem for many people across the cybersecurity industry. We also know that in order to be the most secure we can be, we have to support those who secure us, whether that’s through burnout…

The best iOS fax app to protect your privacy

Mobile faxing is experiencing a significant surge in popularity, driven by both businesses and individuals seeking paperless alternatives. Unsurprisingly, many are now opting for mobile fax apps. If you’re an iPhone user on the lookout for a mobile fax app,…

VPN to protect against DDoS attacks on Twitch

Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it…

2024 Cybersecurity Industry Experts Predictions: Part 1

As 2023 draws to a close, it’s time for cybersecurity experts to gaze into their crystal balls and predict what the next year has set in store for the security industry. In the first part of our predictions round-up experts…

Cyberelements Launches Dedicated MSP Program

Today, Zero Trust Privileged Access Management (PAM) platform cyberelements have launched their Managed Security Provider (MSP) Program enabling partners to increase revenues and deliver a pioneering Zero PAM platform that is set to transform how organisations secure access for standard…

New Synopsys Report Reveals Application Security Automation Soars

Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services,…

Google bins inactive accounts

Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…

Half of Cybersecurity Professionals Kept Awake By Workload Worries

According to research by the Chartered Institute of Information Security (CIISec), cybersecurity professionals report that the industry is “booming”, but 22% of staff report to work unsafe hours. This research, revealed in the Security Profession Survey 2022-2023, gives an insight…

Cyber Mindfulness Corner Company Spotlight: Pentest People

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Gemma Gilderdale, Head of People at Pentest People, spoke to the Gurus about Pentest People’s innovative wellbeing support, the future…

Equal Pay Day: Women, Cybersecurity, and Money

Let’s talk about women – and money. Today (22nd November 2023) marks the day that women effectively stop being paid for the year. Stop being paid against their male counterparts for the same work that they do – for the…

Cato Networks Named SASE Leader, Again

Today, Cato Networks, announced its recognition as a Leader in both the Frost Radar™: Global SASE, 2023 by Frost & Sullivan and the Market Radar: SASE 2023 by Omdia. “Once again, Cato Networks and our cloud-native SASE platform have been…

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…

Can bcrypt Passwords Be Cracked?

Specops Software, an Outpost24 company, have released new research about bcrypt-passwords – and how easy (or not) they are to crack. This research follows previously released data on how long it takes attackers to brute force MD5 hashed user passwords with…

Top 5 Risks of Artificial Intelligence

Artificial intelligence (AI) technology functions in a manner that helps ease human life. Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Unlike humans, who are…

Centripetal Expands Channel Program With Irish Renaissance Partnership

Today, intelligence-powered cybersecurity pros Centripetal have announced a strategic partnership with Renaissance, the leading Irish value-added distributor in Ireland. This collaboration marks a significant milestone in bolstering Ireland’s cybersecurity landscape and underscores the commitment to combating the rising tide of…

SoSafe Pioneers Personalised Approach to Awareness Training

Security awareness and training company SoSafe has announced the launch of the next-generation of personalised learning. The news was revealed at their Human Firewall Conference earlier this week. This latest innovation aims to make secure behaviour second nature for humans. …

New Synopsys Research Reveals a Decrease in Software Vulnerabilities

Today, Synopsys has released its 2023 Software Vulnerability Snapshot report, showcasing a notable decline in vulnerabilities within target applications. The Synopsys Cybersecurity Research Center (CyRC) analysed the data, revealing a decrease from 97% in 2020 to 83% in 2022. This…

Centripetal Launches Global Partner Program

Today, threat intelligence powered cybersecurity pros Centripetal have  launched their partner program to protect organisations around the world by operationalising threat intelligence to safeguard them from every known cyberthreat.  The Centripetal Global Partner Program gives organisations the opportunity to implement…

The Role of Cyber Wellness in Safeguarding Businesses

As I step out of our London office at lunchtime, I’m bombarded with establishments that promote ‘wellness’ in their description. From the £12 salad bar to the yoga and meditation studio, the nail salon to the library, I’m faced with…

Netskope Delivers the Next Gen SASE Branch, Powered by Borderless SD-WAN

Netskope have unveiled their Next Gen SASE Branch, a major step forward in infrastructure that uses Netskope’s award-winning Borderless SD-WAN to transform how organisations manage their most critical networking and security functions and optimise enterprise branches everywhere. In today’s digital…

Keeper Security Announces Integration with ServiceNow

Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect…

Bitwarden Revolutionises Online Security with Passkey Management

Bitwarden has introduced a ground-breaking feature: passkey management. This innovation empowers every Bitwarden user to create, handle, and securely store passkeys within their vaults. With the Bitwarden web extension, users can effortlessly and securely access passkey-enabled websites. These synchronised passkeys…

Remember, Remember: Guy Fawkes and Cybersecurity

In the UK on November 5, we celebrate ‘Guy Fawkes Night’ or ‘Bonfire Night’ often with fireworks and bonfires. Yet, had Guy Fawkes and his conspirators succeeded with the Gunpowder Plot in 1605 to kill King James I and his…

Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities

Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined capabilities in partnership with Rockwell Automation, the world’s largest company dedicated to industrial automation and digital transformation. With this expansion,…

Don’t Get Spooked Into Falling For These Phishing Scams

Halloween season is here, which means carving pumpkins, trick or treating, planning costumes, sneaking the kids’ candy and scary movies, of course. However, one of the scariest threats facing individuals and businesses alike this spooky season is phishing scams. Much…

Lookout Elevates Strategic Investment in Data-centric Cloud Security

Today, Lookout, Inc. announced enhancements to its Lookout Cloud Security Platform that are designed to help organisations better discover, assess, and protect their data as it moves across any network, from the endpoint to the cloud. These enhancements provide organisations…

Salt Security Discovers Flaws in Social Login Mechanism Impacting Thousands of Websites and Exposing Billions of Users to Account Takeover

Today, API security company Salt Security released new threat research from Salt Labs highlighting API security vulnerabilities uncovered in the social sign-in and Open Authentication (OAuth) implementations of multiple online companies, including Grammarly, Vidio, and Bukalapak. The flaws, which have since been remediated,…

In Conversation With Ilona Simpson, CIO EMEA at Netskope

Earlier this year, the Gurus caught up with Ilona Simpson, CIO EMEA at Netskope, to talk all things wellbeing in cybersecurity for The Cyber Mindfulness Corner. What transpired during our short Infosecurity Europe interview was that Ilona had a wealth…

Frontier AI Taskforce harnesses industry leaders to research development risks

The UK government’s Frontier AI Taskforce is establishing an AI safety research team that can research and evaluate risks associated with advanced AI development. As set out in its first progress report on 7th September this year, the taskforce is working with various leading tech organisations, including RAND,…

Be On Alert; That HR Email Could Be A Phishing Email!

New research this week has given warning to employees to be on alert to emails seemingly from human resources (HR) as they could be fraudulent. In fact, the findings from KnowBe4’s latest phishing report has highlighted that fraudulent HR emails remain…

This year’s Security Serious Unsung Heroes Awards winners named

Eskenzi PR has today announced the winners of the eighth annual Security Serious Unsung Heroes Awards. The event took place last night at Balfour St Barts in London and celebrated the UK’s cybersecurity professionals, teachers, lecturers, leaders and those working…

IT Admins Are Just as Guilty For Weak Password Use

New research by Outpost24 has revealed that IT administrators could be just as predictable as end-users when it comes to passwords. An analysis of just over 1.8 million passwords ranked ‘admin’ as the most popular password (with over 40,000 entries),…

Zero to Pentester

It’s rare for a young individual in high school to identify what they want to do for the rest of their life and then carry through with it without ever considering moving out of that field. Rewind to 2013—I’m in…

Cybersecurity’s Future: Women at the Forefront

The cybersecurity landscape is always changing, and women are increasingly being given a platform to break down barriers and advance in an area that has traditionally been dominated by men. Organisations like CyberWomen@Warwick, and by extension, CyberWomen Groups C.I.C., are…

SMBs Struggle to Keep Pace with Cyber Security Threats

Keeping on top of new threats is the biggest cyber security challenge facing small and mid-sized businesses globally (SMBs) – and more than half are calling for help to manage the risks, new global research by Sage reveals today. UK…

No, We’re Not All Going Passwordless

Passwordless authentication methods have been widely spoken about across the cybersecurity and tech industry for years. Offering both hope and fear, a passwordless future has felt imminent for some time. However, an S&P Market Intelligence report report released this week…

The Power of Diversity: Building Stronger Cybersecurity

In an increasingly digital world, cybersecurity has become a critical aspect of our daily lives, with our personal information, financial data, and even national security at stake. However, as the field of cybersecurity continues to evolve, a glaring lack of…

A Third of Brits Give Up on Cyber Security Best Practice

A third (34%) of Brits admit that they have given up following cyber security best practice because it feels like an impossible task, according to new research from Thales. The research, which surveyed over 2,000 UK citizens, found an alarming…

A Third of Brits Give Up on Cyber Security Best Practice

A third (34%) of Brits admit that they have given up following cyber security best practice because it feels like an impossible task, according to new research from Thales. The research, which surveyed over 2,000 UK citizens, found an alarming…

Navigating the intersection of cybersecurity, stress, and risk

According to a 2023 report by Cynet, 94% of surveyed CISOs are grappling with work-induced stress, with 65% admitting to its impact on their organizational defense capabilities. Moreover, approximately 8 in 10 employees note that work-linked stress adversely affects their…

5 Tips for Choosing the Best Proxy Service Provider

Selecting the appropriate proxy provider can frequently appear as a challenging endeavor. The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. However, determining the one…

Cybersecurity sector in drive to boost female tech talent

Cybersecurity giants BAE Systems, DarkTrace and GCHQ are on a mission to address the industry’s gender diversity gap by recruiting more female coders during Cyber Awareness Month. Despite cybersecurity being one of the fastest-growing industries in tech, analysis of the…

Keeper Security Becomes a CVE Numbering Authority

Today, password management company Keeper Security has announced that it has been authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). Keeper is the first password management company to join this global effort to…

Threat Hunting with MITRE ATT&CK

Cybercriminal tactics continue to grow in number and advance in ability; in response, many organisations have seen the need to reach a security posture where their teams can proactively combat threats.   Threat hunting plays a pivotal role in modern…

Guide to ransomware and how to detect it

The landscape of ransomware has undergone rapid evolution, shifting from a relatively straightforward form of malicious software primarily affecting individual computer users, to a menacing enterprise-level threat that has inflicted substantial harm on various industries and government institutions. Ransomware attacks are strategically…