Identity security leader Saviynt has announced a major global expansion, opening new offices in London and Singapore, launching dedicated customer operations in Europe, and preparing for a significantly larger presence in India. The moves come amid growing demand for its…
Tag: IT SECURITY GURU
Check Point CloudGuard WAF Expands in UK With New PoP
Check Point is accelerating its Web Application and API Protection (WAAP) expansion with the launch of new CloudGuard WAF Points of Presence (PoPs) in key strategic markets. The new instance is part of a broader CloudGuard WAF expansion, with additional…
UK Online Safety Act: Is the Day of Reckoning for Adult Websites a Wake-up Call for Games and XR Studios?
Today, the UK’s Online Safety Act enters a new phase of enforcement and media attention is riveted on the adult content industry. Age assurance is not only required, but now actively policed, with Ofcom empowered to block access and impose…
Half of Organisations Using PAM Report Fewer Security Incidents Tied to Privilege Misuse
Today Keeper Security released its latest Insight Report, Securing Privileged Access: The Key to Modern Enterprise Defence, all about privileged access management (PAM). The report found that nearly half (49%) of organisations with PAM report fewer security incidents tied to privilege…
How the EU Is Fighting Back Against Deepfakes
Deepfakes have now crossed the line from science fiction to reality. These AI-generated audio and video forgeries are becoming more believable and increasingly dangerous. From political smear campaigns and celebrity impersonations to scams targeting businesses and individuals, deepfakes have the…
How SWIS school strengthened staff online safety and compliance with Meta1st
Against the backdrop of escalating cyberattack threats, schools face growing pressure to ensure the safety, compliance and digital literacy of both students and staff. At SWIS school, a private school based near London, this challenge was recognised early and acted…
The password that sank a 158-year-old business
The 2023 collapse of the 158-year old UK logistics company KNP resulted in the loss of 700 jobs. The devastating cyber attack that shuttered the company has returned to the spotlight this week with a BBC Panorama documentary examining the…
Majority of CISOs Lack Full Visibility Over APIs
New research by Salt Security has revealed that the majority of CISOs do not have full visibility over their API environments, despite recognition of the growing API attack surface. The 2025 Salt Security CISO Report found that while 73% of CISOs…
Nearly Half of MSPs Have Dedicated Kitty For Ransomware Incidents
Recent research by Cybersmart has revealed that nearly half (45%) of MSPs admitted to having a dedicated pool of money set aside for ransomware payments. This is despite increasing pressure from insurers and global governments to avoid paying ransoms to…
Jonathan Zanger Named CTO at Check Point to Boost AI Cybersecurity
Check Point Software has appointed Jonathan Zanger as its new Chief Technology Officer, tasking the former Trigo executive with driving the company’s global cybersecurity and AI strategy. Zanger brings over 15 years of experience building and scaling AI-powered cybersecurity platforms.…
Check Point Unveils Quantum Spark 2500 Series, Bringing Enterprise-Level Security and Advanced Connectivity to SMBs
Check Point has unveiled the new Quantum Spark 2500 series, a next-generation firewall family designed for small and medium-sized businesses (SMBs) and managed service providers (MSPs). With built-in Wi-Fi 7, 5G, SD-WAN, and AI-powered threat prevention, the 2500 series delivers…
AI Appreciation Day: Celebrating Progress, Embracing Responsibility
As artificial intelligence (AI) becomes increasingly embedded in the fabric of our daily lives, workplaces, and digital infrastructure, AI Appreciation Day presents the perfect opportunity to reflect not only on its transformative power but also the responsibilities that come with…
Identity-based attacks lead cybersecurity concerns as AI threats rise and zero trust adoption lags
Identity-based attacks have taken centre stage as the top cybersecurity concern for organisations in the coming year, according to a new survey conducted by Keeper Security at Infosecurity Europe 2025. The leading cybersecurity provider of zero-trust and zero-knowledge Privileged Access…
CREST introduces a staged pathway for advancement to globally-recognised CREST cybersecurity accreditation
The CREST Pathway and Pathway+ options make cybersecurity accreditation accessible to all organisations that aspire to provide cybersecurity services at the highest levels of quality but would benefit from additional resources and guidance to reach their goal. International cybersecurity not-for-profit,…
Forescout Vedere Labs shows “vibe hacking” isn’t quite the threat it’s made out to be… yet
Forescout’s Vedere Labs has published new research examining the real-world threat posed by generative AI in cyberattacks. While public concern is growing around “vibe hacking“, a term describing AI-driven, autonomous hacking, the research findings suggest the threat remains in its…
MSPs Under More Scrutiny From Customers on Cyber Than Ever
New research by Cybersmart has revealed that over half (58%) of MSP leaders globally believe their customers are at more risk today than this time last year. As a result, MSPs are being relied upon more than ever by customers…
Huntress and Microsoft Collaborate to Strengthen Cybersecurity for Businesses Worldwide
Huntress has announced a new collaboration with Microsoft aimed at enhancing cybersecurity for businesses of all sizes. As cyberattacks grow increasingly sophisticated, this partnership seeks to equip organisations, especially those with limited resources and in-house expertise, with the tools and…
Trust nothing, verify everything: Why the UK public sector must embrace Zero Trust
The UK’s public sector is under siege. Not by visible enemies, but by a wave of cyber threats. In 2024, the National Cyber Security Centre reported a 16% increase in serious attacks impacting national security. These aren’t theoretical risks. They…
Black Duck Sets New Standard with Polaris, First AppSec SaaS Hosted in Saudi Arabia
Leading global application security provider Black Duck has reinforced its commitment to the Saudi Arabian market with the introduction of the Black Duck Polaris® Platform as the first application security software as a service (SaaS) platform hosted in the Kingdom of…
Empowered employees strengthen financial sector digital resilience
Ensuring that any organisation can withstand, respond effectively to and recover quickly from ICT disruptions is a strategic imperative. This is particularly true within the financial sector. The Digital Operational Resilience Act (DORA), which became mandatory on 17 January this…
Ransomware Attacks Spike Despite Gang Closure
New research from Comparitech revealed that in the first half of 2025, 3,627 ransomware attacks were reported and logged. This is a 47% increase since the first half of 2024, which is highly concerning for major organisations due to the…
Psychological Contract Breach and the Power of Security Culture – Research Insights
Employees are expected to behave securely, and the definition of “securely” is often written down in a myriad of security policies. Yet, people do not always comply with security policies or make use of available tools. Gartner documents in their…
How to Secure Your Promo Codes Against Cyber Exploits
Promo codes provide a fantastic opportunity to increase customer traffic and generate sales, yet there is a potential risk with them. Promo codes are one of the objects of interest to cybercriminals because they exploit those codes and use them…
A third of organisations take more than 90 days to remediate threats
The recent Global Industrial Cybersecurity Benchmark 2025 by Takepoint Research, sponsored by Forescout, revealed an overconfidence in critical infrastructure security. Notably, the research found that 44% of industrial organisations claim to have strong real-time cyber visibility, but nearly 60% have…
Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
With today’s unpredictable cyber threat landscape, proactive security measures are crucial. Infinity Global Services (IGS) offers penetration testing (PT), a vital service that uncovers vulnerabilities before exploitation. Delivered by a team of seasoned experts, IGS’s penetration testing service has now…
How Betting Sites Keep Your Information Safe (Without You Even Noticing)
Ever wondered what’s going on behind the scenes when you place a bet online? No, not the odds or the algorithms that somehow know your team’s about to blow a 2–0 lead again – we’re talking about the security side…
Defining Cyber Resilience: Industry Leaders Meet in London as AI Threats Accelerate
Last week, Check Point hosted its annual Cyber Leader Summit at Landing Forty-Two in London’s iconic Leadenhall Building. The summit convened influential figures from the cybersecurity, law enforcement, and enterprise communities to explore the rapidly evolving threat landscape and the…
Bridewell report indicates rise in lone wolf ransomware actors
Bridewell, a UK-based cybersecurity services company, has released its latest CTI Annual Report – a comprehensive deep dive into ransomware trends. It highlighted a significant shift in attack strategies, payment dynamics and threat actor behaviours, revealing that data theft and…
Black Duck Teams with Arm to Boost EU Cyber Resilience Act Compliance
Software security company Black Duck is ramping up efforts to help organizations comply with the European Cyber Resilience Act (CRA), building on a 20-year partnership with British chip design giant Arm. The collaboration focuses on securing software running on Arm64-based…
Keeper Security Achieves SOC 3 Compliance
Keeper Security has achieved System and Organisation Controls (SOC) 3® compliance, demonstrating the company’s commitment to the highest standards of security for all users. The SOC 3 report, governed by the American Institute of Certified Public Accountants (AICPA), is a…
Over Two Thirds of MSPs Hit by Multiple Breaches in Past Year, Survey Reveals
Today, Cybersmart, a provider of cyber risk management for small businesses, has released the findings from its second annual CyberSmart MSP Survey, which focuses on the security of Managed Service Providers (MSPs) and their customers. The 2025 report revealed that 69%…
US States with Notable Consumer Data Privacy Laws
Privacy issues have garnered significant attention from the state despite not typically being at the forefront of discussions regarding data regulation. The states included in the article are not in any specific sequence. Kentucky Steps Up Early Sectors like entertainment…
Top 5 AI SOC Analyst Platforms to Watch out for in 2025
As threats evolve in sophistication and frequency while cyber skills gaps persist, Security Operations Centres (SOCs) are increasingly turning to AI-driven platforms to enhance threat detection, streamline investigations, and automate responses. But which one is the best? Prophet Security (Best…
Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
A newly discovered ransomware operation dubbed Fog is raising fresh concerns in the cybersecurity community after researchers found it leveraging a highly unusual mix of legitimate business software and open-source offensive security tools. The campaign, observed in June 2025, is…
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2025
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Novotel ExCeL, as part of Pulse Conference’s Cyber 100 event on the 4th June 2025. The awards celebrated the industry’s best blogs, podcasts and vlogs,…
Keeper Security Named Overall Leader on GigaOm Radar Report for Enterprise Password Management
Keeper Security has announced its placement as the Overall Leader in GigaOm’s Radar Report for Enterprise Password Management for the fourth consecutive year. With this designation, Keeper is proud to represent the balance between GigaOm’s highlighted traits of maturity and…
Black Duck Elevates Leadership with New Chief Product & Technology Officer
Black Duck has announced the appointment of Dipto Chakravarty as Chief Product & Technology Officer. Mr. Chakravarty brings a 30+ year track record of leading product development and technology teams, with domain expertise in AI, data intelligence, cloud security, and…
APIContext Releases Guide to Enterprise API Readiness for Autonomous AI Agents
In 2025, agentic AI has rapidly moved from theoretical promise to real-world implementation, reshaping the digital infrastructure of enterprises worldwide. These autonomous systems, capable of making decisions, initiating actions, and interacting with APIs at machine speed, are unlocking extraordinary efficiencies…
CybaVerse Acquires SecureAck to Expand Next-Gen Security Operations Platform for SMEs and MSPs
CybaVerse has today announced it has acquired SecureAck, a scalable automation platform designed to simplify security across IT and OT environments. The acquisition will accelerate the development of CybaVerse’s proprietary platform, CybaVerse AI, and expand support for small to mid-sized enterprises…
Huntress Unveils Immersive Cybersecurity Training That Puts Users in the Shoes of Hackers
In an effort to overhaul traditional security awareness training (SAT), cybersecurity firm Huntress has introduced Threat Simulator, a new feature of its Managed Security Awareness Training (SAT) platform, designed to immerse users in the tactics, techniques, and mindset of cyber attackers. Old-school SAT…
KnowBe4 Wins Multiple 2025 Top Rated Awards From TrustRadius
KnowBe4, the security awareness training provider, have announced that TrustRadius has recognised KnowBe4 with multiple 2025 Top Rated Awards. KnowBe4’s Security Awareness Training won in the Security Awareness Training category, PhishER won in Incident Response, Security Orchestration Automation and Response,…
High Stakes Privacy: A Guide to Data Security in Gambling
When signing into a real money online casino, your deposits are not the only things at risk—your data is, too. All sorts of sensitive information, ranging from signing up to making a payment, are collected and managed by online gambling…
Can Online Casino Accounts Be Hacked?
Online casino platforms are not immune to compromise, but the most successful breaches don’t happen through the front door. They happen when users bring bad habits to high-risk environments. For hackers, it’s rarely about breaking encryption, it’s about exploiting behavior.…
HostBreach Offers Free Cyber Snapshot For CMMC Compliance Requirements
Philadelphia-based cybersecurity firm HostBreach is offering a free CMMC Cyber Snapshot to businesses looking to maintain CMMC compliance. In particular, this refers to government contractors (GovCon) and federal contractors so they can organise their cybersecurity posture pending the Cybersecurity Maturity Model Certification…
ACDS Continues Global Expansion With Announcement of New French Entity
Advanced Cyber Defence Systems (ACDS) has today unveiled plans for further global expansion with the establishment of its new French entity. This follows its expansion across APAC last year through partnerships and personnel hires in the region. ACDS France will…
Keeper Security Introduces Bidirectional One-Time Sharing Feature to Its Password Manager Platform
Keeper Security has unveiled an update to its password management platform: Keeper’s upgraded One-Time Share. The new feature enables bidirectional, single-use encrypted sharing between Keeper users and non-users, providing customers with a secure way of exchanging confidential information with their…
IT Security Guru picks for Infosecurity Europe 2025
With Infosecurity Europe around the corner next week, planning your schedule can be tricky. But never fear! The Gurus have been busy collecting a selection of unmissable events to help you plan your days and ensure you get the most…
Smarter Defenses: How AI Improves Security for Low/No-Code and Vibe Coded Applications
Companies want results fast, and low/no-code (LCNC) and Vibe Coding platforms promise just that: rapid application development with either no coding or AI-generated coding. LCNC and Large Language Model (LLM) Vendors quickly release products to get ahead in the AI…
Check Point Enhances Enterprise Security with AI-Driven Threat Management
Check Point Software has announced the launch of its next generation Quantum Smart-1 Management Appliances. These appliances deliver 2X increase in managed gateways and up to 70% higher log rate, with AI-powered security tools designed to meet the demands of…
Check Point Launches Next-Gen Branch Office Security, Boosting Threat Prevention Speed by 4x
Check Point has announced significant advancements to its Quantum Force Security Gateways family. As a result, all Quantum Force Security Gateways for data centres and perimeters are set to receive a 15-25% performance uplift in threat prevention throughput, delivered automatically…
Check Point to Acquire Veriti to Transform Threat Exposure Management
Check Point Software has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. The acquisition aims to respond to the uptick in AI-fuelled attacks facing organisations, as well as the…
Finding the right balance between ‘vibe coders’ and security
In today’s digital workplaces, more employees are building their own applications by generating code using Low Code No Code (LCNC), Artificial Intelligence (AI) and Large Language Model (LLM) tools instead of manually writing lines of code. These employees are called…
Keeper Security appoints new CISO
Keeper Security, the cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, is pleased to announce that security industry veteran Shane Barney has been appointed Chief Information Security Officer…
Salt Security Partners With Wiz, Combines Cloud and API Security
API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations to detect, comprehend, and respond to both API security posture gaps…
ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience
The European Union Agency for Cybersecurity (ENISA) has unveiled the European Vulnerability Database (EUVD), a strategic move designed to enhance digital security across the bloc and reduce reliance on U.S.-centric cybersecurity infrastructure. The EUVD, now live for consultation, aggregates vulnerability…
AI Agents: Transformative or Turbulent?
Described as revolutionary and disruptive, AI agents are the new cornerstone of innovation in 2025. But as with any technology standing on the cutting edge, this evolution isn’t without its trade-offs. Will this new blend of intelligence and autonomy really…
Exploring CNAPP Options for Cloud Security in 2025
Cloud adoption continues to rise, and with it comes increased complexity. Organizations use multiple cloud platforms, creating challenges that traditional security tools struggle to handle. Cloud-Native Application Protection Platforms (CNAPPs) have emerged as vital solutions. CNAPPs offer integrated security across…
How Compliance Training Software Protects Your Business from Risk
The modern business environment exposes organizations to a range of challenges that affect business operations, hence the need for robust regulations. Ignoring standards and guidelines can lead to costly fines, operational disruptions, and reputational damage. Last year, a US court…
WatchGuard transitions new CEO
WatchGuard® Technologies, a provider of unified cybersecurity for managed service providers (MSPs), today announced a planned leadership transition. After a decade of impactful leadership, Chief Executive Officer (CEO) Prakash Panjwani will transition out of his operational role, continuing to serve…
What Should You Consider When Choosing an AI Penetration Testing Company?
AI is truly making its way into every aspect of business operations, and rightly so. When we proactively test systems and applications to uncover weaknesses before attackers do, we’re carrying out penetration testing, often called “ethical hacking.” By staging these…
How To Secure Digital Wallets from Phishing Attacks
Digital wallets have become increasingly popular, offering users an easy way to make payments, store cryptocurrencies, and manage their money. But as more people use digital wallets, the risk of cyber threats, especially phishing attacks, has also grown. Phishing is…
Samsung MagicINFO Server Flaw Now Actively Exploited – Huntress Uncovers Real-World Attacks
Cybersecurity researchers at Huntress have issued a warning after confirming active exploitation of a critical remote code execution (RCE) vulnerability in Samsung’s MagicINFO 9 digital signage software. The flaw, tracked as CVE-2024-34515, allows unauthenticated attackers to execute arbitrary code on…
MIWIC25: Kiranjit Kaur Shergill, Developer at Barclays
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Stephanie Itimi, Director of Information Protection and Compliance, Age UK, Founder & Chair, Seidea CIC
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Keeper Security renews Atlassian Williams Racing F1 partnership
Keeper Security, the provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announced a multi-year renewal of its partnership with Atlassian Williams Racing. “We’re thrilled to continue our synergistic…
MIWIC25: Marine Ruhamanya, Cybersecurity Senior Manager
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Co-op Hack Triggers Swift Cyber Response Amid Rising Retail Threats
Co-op has confirmed that it was forced to shut down parts of its systems following an attempted cyber intrusion, raising fresh concerns over the growing wave of cyberattacks targeting the UK retail sector. The incident, which emerged late last week,…
OSP Cyber Academy Cyber Awareness Courses Integrated into Bahraini School Curriculum
OSP Cyber Academy today announced a strategic new partnership with Bahrain’s National Cyber Security Centre (NCSC) to deliver cyber safety education to 70,000 students across the Kingdom. The partnership introduces culturally tailored, gamified cyber awareness courses designed to enhance students’ understanding…
World Password Day 2025: Rethinking Security in the Age of MFA and Passkeys
Despite the rising use of biometrics, passkeys, and identity-based threat detection tools, one thing remains clear: passwords continue to be the frontline defence for digital access and often, the weakest link. Tomorrow is World Password Day, and cybersecurity experts are…
KnowBe4 Appoints Bryan Palma as President and CEO
KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, announced that cybersecurity industry veteran Bryan Palma has been appointed president and chief executive officer of KnowBe4, effective May 5. KnowBe4’s founder and current chief executive officer Stu Sjouwerman has…
Q&A – Securely Yours: An Agony Aunt’s Guide to Surviving Cyber
What happens when two titans of cybersecurity (Rebecca Taylor, Threat Intelligence Knowledge Manager and Researcher at Secureworks, a Sophos company, and Amelia Hewitt, Founder of CybAid and Managing Director at Hewitt Partnerships) join forces to write a book? Securely Yours:…
SOCRadar Launches AI-Powered Cybersecurity Assistant ‘Copilot’
At RSAC 2025, SOCRadar have unveiled SOCRadar Copilot, an AI-powered cybersecurity assistant designed to enhance platform efficiency, share knowledge and insights, and automate routine security operations. It will help time-strapped security teams to streamline security processes and reporting, all while…
Salt Security Launches the First MCP Server to Revolutionise API Security in the Age of AI
API security pros Salt Security have announced the launch of the Salt Model Context Protocol (MCP) Server at RSAC 2025, giving enterprise teams a novel access point of interaction with their API infrastructure, leveraging natural language and artificial intelligence (AI). Built on…
Keeper Security Enhances Browser Extension With New Autofill Controls, PAM Support And Snapshot Tool
Keeper Security has announced the launch of its Browser Extension 17.1. The significant update to Keeper’s award-winning cybersecurity software brings enhanced autofill customisation to its browser extension, along with expanded PAM capabilities and a new AI-powered tool to improve issue…
6 Best CMMC Consulting Services for Small Businesses
The best CMMC consulting service for small businesses can help you stay competitive and compliant in the defense space. CMMC — or Cybersecurity Maturity Model Certification — is a security framework developed by the U.S. Department of Defense (DoD) to…
MIWIC25: Caroline Kamper, Strategic Cyber Threat Intelligence Analyst, SecAlliance
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
New research by Logicalis reveals that CIOs are struggling to derive value from security investments amid changing threat landscape. According to its annual CIO Report, which surveyed 1,000 global IT leaders, more than half say their security patch systems have…
Organisations Unprepared For Age of Quantum Computing
New research by ISACA has found that quantum computing, and the changes it will bring, is broadly welcomed by over half of cyber and IT professionals as a way of creating new opportunities for business. A further 44% believe quantum…
Huntress Unveils Enhanced Identity Threat Detection & Response Solution as New Research Warns of Rising Identity-Based Attacks
Huntress today announced major enhancements to its Managed Identity Threat Detection and Response (ITDR) solution, delivering a purpose-built answer to disrupt hacker identity tradecraft. Alongside the launch, Huntress also revealed new research underscoring the growing threat of identity-based attacks and…
Drained Wallets: How to Protect Your Assets From Advanced Phishing Scams
With the rapid expansion of technological advancements, there have been many great innovations across various industries that have had a positive impact on the world. However, these advancements also mean the latest technologies may not always be used for legal…
Check Point and Illumio Team Up to Advance Zero Trust with Unified Security and Threat Prevention
Check Point Software Technologies and Illumio have announced a strategic partnership aimed at helping organisations enhance their Zero Trust strategies and proactively contain cyber threats. The integration brings together Check Point’s Infinity Platform, which includes Quantum Force firewalls, Infinity ThreatCloud…
MIWIC25: Jess Matthews, Compliance Governance Officer at Acacium Group
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Helen Oluyemi, Information Security Manager at Pollinate International Limited
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
SandboxAQ Launches AQtive Guard to Secure Billions of AI-Driven Non-Human Identities
As AI agents proliferate across enterprise networks, posing a new wave of intelligent and adaptive cyber threats, SandboxAQ has launched a platform designed to meet the moment. The cybersecurity and quantum tech firm today unveiled AQtive Guard, a new solution…
ISACA and Chartered IIA pen open letter to UK Government urging swift audit reform to build digital resilience
ISACA and the Chartered Institute of Internal Auditors (Chartered IIA), have sent a letter to Rt Hon Jonathan Reynolds MP, Secretary of State for Business and Trade, stressing the urgent need for audit reform legislation to boost digital resilience. The…
Entrust Announces all-in-one Cryptographic Security Platform
Entrust has announced the Entrust Cryptographic Security Platform, for release in May. The platform is a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks on data security and identity systems are exploding in scale and sophistication.…
9 Modern Ways You Can Use Bitcoin in 2025
Cryptocurrency is slowly becoming a regular way to pay for something, with new uses popping up every day. Many people choose Bitcoin, among others, because it’s easy to use, quick, secure, private, and more affordable than traditional methods. 1. Gaming,…
Bridewell research finds UK Financial Services under pressure from cyber security challenges and mounting regulatory requirements
Research from Bridewell, a leading UK-based cyber security services provider, has found compliance with regulation as the chief challenge, as well as the main stimulus, for increasing cyber security maturity in the financial services sector. The study, entitled Cyber Security…
MIWIC25: Sochima Okoye, Cybersecurity Consultant at CSA Cyber
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Anastasiia Ostrovska, co-founder & CEO Women’s Leadership and Strategic Initiatives Foundation (WLSIF)
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Katie Beecroft, Associate Director Risk & Security, Fidelity International
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Lisa Landau, CEO and Co-Founder of ThreatLight
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
From $2M to $750M: Phaneesh Murthy’s Blueprint for Exponential Growth in Technology Services
In the competitive landscape of global technology services, few executives can claim the kind of transformative growth that Phaneesh Murthy has orchestrated throughout his career. His most remarkable achievement came during his tenure at Infosys, where he helped scale…
MIWIC25: Michelle Corrigan, Director of Digital Care Hub
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Identity Fraud Costs Orgs Average of $7m Annually
New research has revealed the escalating cost of identity fraud and the impact it has on organisations. The research, a joint global study by Entrust and Docusign, showed the trade-offs enterprises face between security and customer experience. The Future of Global Identity…
Salt Security and CrowdStrike Strengthen Partnership
Salt Security has announced API integrations with the CrowdStrike Falcon® platform to enhance and accelerate API discovery, posture governance and threat protection. This integration allows for rapid API discovery through a new Foundry application and provides real-time threat insights via…
Bridewell appoints Sam Thornton as COO to strengthen operations and accelerate growth
Leading UK cyber security firm, Bridewell, has announced the appointment of Sam Thornton as Chief Operating Officer and welcomed him to its board of directors, a move which the company hopes will further strengthen Bridewell’s position as a globally recognised…
4 Tips For Crypto Wallet Security
Cryptocurrency will be more popular in 2025 than it has ever been and this means that there is a greater need for wallet security. As the crypto sector becomes more profitable and popular, malicious actors will look to exploit investors…
Top 5 Web Application Penetration Testing Companies UK
Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can…
Keeper Unveils Latest WearOS App for Android
Keeper Security has unveiled its latest improvements to the Keeper WearOS app that accompanies their flagship password management solution. The upscaled app enhances security and ease for smartwatch users. The update aligns with Google’s latest Android guidelines, providing a more intuitive…