A newly discovered ransomware operation dubbed Fog is raising fresh concerns in the cybersecurity community after researchers found it leveraging a highly unusual mix of legitimate business software and open-source offensive security tools. The campaign, observed in June 2025, is…
Tag: IT SECURITY GURU
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2025
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Novotel ExCeL, as part of Pulse Conference’s Cyber 100 event on the 4th June 2025. The awards celebrated the industry’s best blogs, podcasts and vlogs,…
Keeper Security Named Overall Leader on GigaOm Radar Report for Enterprise Password Management
Keeper Security has announced its placement as the Overall Leader in GigaOm’s Radar Report for Enterprise Password Management for the fourth consecutive year. With this designation, Keeper is proud to represent the balance between GigaOm’s highlighted traits of maturity and…
Black Duck Elevates Leadership with New Chief Product & Technology Officer
Black Duck has announced the appointment of Dipto Chakravarty as Chief Product & Technology Officer. Mr. Chakravarty brings a 30+ year track record of leading product development and technology teams, with domain expertise in AI, data intelligence, cloud security, and…
APIContext Releases Guide to Enterprise API Readiness for Autonomous AI Agents
In 2025, agentic AI has rapidly moved from theoretical promise to real-world implementation, reshaping the digital infrastructure of enterprises worldwide. These autonomous systems, capable of making decisions, initiating actions, and interacting with APIs at machine speed, are unlocking extraordinary efficiencies…
CybaVerse Acquires SecureAck to Expand Next-Gen Security Operations Platform for SMEs and MSPs
CybaVerse has today announced it has acquired SecureAck, a scalable automation platform designed to simplify security across IT and OT environments. The acquisition will accelerate the development of CybaVerse’s proprietary platform, CybaVerse AI, and expand support for small to mid-sized enterprises…
Huntress Unveils Immersive Cybersecurity Training That Puts Users in the Shoes of Hackers
In an effort to overhaul traditional security awareness training (SAT), cybersecurity firm Huntress has introduced Threat Simulator, a new feature of its Managed Security Awareness Training (SAT) platform, designed to immerse users in the tactics, techniques, and mindset of cyber attackers. Old-school SAT…
KnowBe4 Wins Multiple 2025 Top Rated Awards From TrustRadius
KnowBe4, the security awareness training provider, have announced that TrustRadius has recognised KnowBe4 with multiple 2025 Top Rated Awards. KnowBe4’s Security Awareness Training won in the Security Awareness Training category, PhishER won in Incident Response, Security Orchestration Automation and Response,…
High Stakes Privacy: A Guide to Data Security in Gambling
When signing into a real money online casino, your deposits are not the only things at risk—your data is, too. All sorts of sensitive information, ranging from signing up to making a payment, are collected and managed by online gambling…
Can Online Casino Accounts Be Hacked?
Online casino platforms are not immune to compromise, but the most successful breaches don’t happen through the front door. They happen when users bring bad habits to high-risk environments. For hackers, it’s rarely about breaking encryption, it’s about exploiting behavior.…
HostBreach Offers Free Cyber Snapshot For CMMC Compliance Requirements
Philadelphia-based cybersecurity firm HostBreach is offering a free CMMC Cyber Snapshot to businesses looking to maintain CMMC compliance. In particular, this refers to government contractors (GovCon) and federal contractors so they can organise their cybersecurity posture pending the Cybersecurity Maturity Model Certification…
ACDS Continues Global Expansion With Announcement of New French Entity
Advanced Cyber Defence Systems (ACDS) has today unveiled plans for further global expansion with the establishment of its new French entity. This follows its expansion across APAC last year through partnerships and personnel hires in the region. ACDS France will…
Keeper Security Introduces Bidirectional One-Time Sharing Feature to Its Password Manager Platform
Keeper Security has unveiled an update to its password management platform: Keeper’s upgraded One-Time Share. The new feature enables bidirectional, single-use encrypted sharing between Keeper users and non-users, providing customers with a secure way of exchanging confidential information with their…
IT Security Guru picks for Infosecurity Europe 2025
With Infosecurity Europe around the corner next week, planning your schedule can be tricky. But never fear! The Gurus have been busy collecting a selection of unmissable events to help you plan your days and ensure you get the most…
Smarter Defenses: How AI Improves Security for Low/No-Code and Vibe Coded Applications
Companies want results fast, and low/no-code (LCNC) and Vibe Coding platforms promise just that: rapid application development with either no coding or AI-generated coding. LCNC and Large Language Model (LLM) Vendors quickly release products to get ahead in the AI…
Check Point Enhances Enterprise Security with AI-Driven Threat Management
Check Point Software has announced the launch of its next generation Quantum Smart-1 Management Appliances. These appliances deliver 2X increase in managed gateways and up to 70% higher log rate, with AI-powered security tools designed to meet the demands of…
Check Point Launches Next-Gen Branch Office Security, Boosting Threat Prevention Speed by 4x
Check Point has announced significant advancements to its Quantum Force Security Gateways family. As a result, all Quantum Force Security Gateways for data centres and perimeters are set to receive a 15-25% performance uplift in threat prevention throughput, delivered automatically…
Check Point to Acquire Veriti to Transform Threat Exposure Management
Check Point Software has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. The acquisition aims to respond to the uptick in AI-fuelled attacks facing organisations, as well as the…
Finding the right balance between ‘vibe coders’ and security
In today’s digital workplaces, more employees are building their own applications by generating code using Low Code No Code (LCNC), Artificial Intelligence (AI) and Large Language Model (LLM) tools instead of manually writing lines of code. These employees are called…
Keeper Security appoints new CISO
Keeper Security, the cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, is pleased to announce that security industry veteran Shane Barney has been appointed Chief Information Security Officer…
Salt Security Partners With Wiz, Combines Cloud and API Security
API security orgnanisation Salt Security has announced its expanded partnership and new integration with Wiz, the leader in cloud security. The integration between Salt Security and Wiz enables organisations to detect, comprehend, and respond to both API security posture gaps…
ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience
The European Union Agency for Cybersecurity (ENISA) has unveiled the European Vulnerability Database (EUVD), a strategic move designed to enhance digital security across the bloc and reduce reliance on U.S.-centric cybersecurity infrastructure. The EUVD, now live for consultation, aggregates vulnerability…
AI Agents: Transformative or Turbulent?
Described as revolutionary and disruptive, AI agents are the new cornerstone of innovation in 2025. But as with any technology standing on the cutting edge, this evolution isn’t without its trade-offs. Will this new blend of intelligence and autonomy really…
Exploring CNAPP Options for Cloud Security in 2025
Cloud adoption continues to rise, and with it comes increased complexity. Organizations use multiple cloud platforms, creating challenges that traditional security tools struggle to handle. Cloud-Native Application Protection Platforms (CNAPPs) have emerged as vital solutions. CNAPPs offer integrated security across…
How Compliance Training Software Protects Your Business from Risk
The modern business environment exposes organizations to a range of challenges that affect business operations, hence the need for robust regulations. Ignoring standards and guidelines can lead to costly fines, operational disruptions, and reputational damage. Last year, a US court…
WatchGuard transitions new CEO
WatchGuard® Technologies, a provider of unified cybersecurity for managed service providers (MSPs), today announced a planned leadership transition. After a decade of impactful leadership, Chief Executive Officer (CEO) Prakash Panjwani will transition out of his operational role, continuing to serve…
What Should You Consider When Choosing an AI Penetration Testing Company?
AI is truly making its way into every aspect of business operations, and rightly so. When we proactively test systems and applications to uncover weaknesses before attackers do, we’re carrying out penetration testing, often called “ethical hacking.” By staging these…
How To Secure Digital Wallets from Phishing Attacks
Digital wallets have become increasingly popular, offering users an easy way to make payments, store cryptocurrencies, and manage their money. But as more people use digital wallets, the risk of cyber threats, especially phishing attacks, has also grown. Phishing is…
Samsung MagicINFO Server Flaw Now Actively Exploited – Huntress Uncovers Real-World Attacks
Cybersecurity researchers at Huntress have issued a warning after confirming active exploitation of a critical remote code execution (RCE) vulnerability in Samsung’s MagicINFO 9 digital signage software. The flaw, tracked as CVE-2024-34515, allows unauthenticated attackers to execute arbitrary code on…
MIWIC25: Kiranjit Kaur Shergill, Developer at Barclays
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Stephanie Itimi, Director of Information Protection and Compliance, Age UK, Founder & Chair, Seidea CIC
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Keeper Security renews Atlassian Williams Racing F1 partnership
Keeper Security, the provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, today announced a multi-year renewal of its partnership with Atlassian Williams Racing. “We’re thrilled to continue our synergistic…
MIWIC25: Marine Ruhamanya, Cybersecurity Senior Manager
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Co-op Hack Triggers Swift Cyber Response Amid Rising Retail Threats
Co-op has confirmed that it was forced to shut down parts of its systems following an attempted cyber intrusion, raising fresh concerns over the growing wave of cyberattacks targeting the UK retail sector. The incident, which emerged late last week,…
OSP Cyber Academy Cyber Awareness Courses Integrated into Bahraini School Curriculum
OSP Cyber Academy today announced a strategic new partnership with Bahrain’s National Cyber Security Centre (NCSC) to deliver cyber safety education to 70,000 students across the Kingdom. The partnership introduces culturally tailored, gamified cyber awareness courses designed to enhance students’ understanding…
World Password Day 2025: Rethinking Security in the Age of MFA and Passkeys
Despite the rising use of biometrics, passkeys, and identity-based threat detection tools, one thing remains clear: passwords continue to be the frontline defence for digital access and often, the weakest link. Tomorrow is World Password Day, and cybersecurity experts are…
KnowBe4 Appoints Bryan Palma as President and CEO
KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, announced that cybersecurity industry veteran Bryan Palma has been appointed president and chief executive officer of KnowBe4, effective May 5. KnowBe4’s founder and current chief executive officer Stu Sjouwerman has…
Q&A – Securely Yours: An Agony Aunt’s Guide to Surviving Cyber
What happens when two titans of cybersecurity (Rebecca Taylor, Threat Intelligence Knowledge Manager and Researcher at Secureworks, a Sophos company, and Amelia Hewitt, Founder of CybAid and Managing Director at Hewitt Partnerships) join forces to write a book? Securely Yours:…
SOCRadar Launches AI-Powered Cybersecurity Assistant ‘Copilot’
At RSAC 2025, SOCRadar have unveiled SOCRadar Copilot, an AI-powered cybersecurity assistant designed to enhance platform efficiency, share knowledge and insights, and automate routine security operations. It will help time-strapped security teams to streamline security processes and reporting, all while…
Salt Security Launches the First MCP Server to Revolutionise API Security in the Age of AI
API security pros Salt Security have announced the launch of the Salt Model Context Protocol (MCP) Server at RSAC 2025, giving enterprise teams a novel access point of interaction with their API infrastructure, leveraging natural language and artificial intelligence (AI). Built on…
Keeper Security Enhances Browser Extension With New Autofill Controls, PAM Support And Snapshot Tool
Keeper Security has announced the launch of its Browser Extension 17.1. The significant update to Keeper’s award-winning cybersecurity software brings enhanced autofill customisation to its browser extension, along with expanded PAM capabilities and a new AI-powered tool to improve issue…
6 Best CMMC Consulting Services for Small Businesses
The best CMMC consulting service for small businesses can help you stay competitive and compliant in the defense space. CMMC — or Cybersecurity Maturity Model Certification — is a security framework developed by the U.S. Department of Defense (DoD) to…
MIWIC25: Caroline Kamper, Strategic Cyber Threat Intelligence Analyst, SecAlliance
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
New research by Logicalis reveals that CIOs are struggling to derive value from security investments amid changing threat landscape. According to its annual CIO Report, which surveyed 1,000 global IT leaders, more than half say their security patch systems have…
Organisations Unprepared For Age of Quantum Computing
New research by ISACA has found that quantum computing, and the changes it will bring, is broadly welcomed by over half of cyber and IT professionals as a way of creating new opportunities for business. A further 44% believe quantum…
Huntress Unveils Enhanced Identity Threat Detection & Response Solution as New Research Warns of Rising Identity-Based Attacks
Huntress today announced major enhancements to its Managed Identity Threat Detection and Response (ITDR) solution, delivering a purpose-built answer to disrupt hacker identity tradecraft. Alongside the launch, Huntress also revealed new research underscoring the growing threat of identity-based attacks and…
Drained Wallets: How to Protect Your Assets From Advanced Phishing Scams
With the rapid expansion of technological advancements, there have been many great innovations across various industries that have had a positive impact on the world. However, these advancements also mean the latest technologies may not always be used for legal…
Check Point and Illumio Team Up to Advance Zero Trust with Unified Security and Threat Prevention
Check Point Software Technologies and Illumio have announced a strategic partnership aimed at helping organisations enhance their Zero Trust strategies and proactively contain cyber threats. The integration brings together Check Point’s Infinity Platform, which includes Quantum Force firewalls, Infinity ThreatCloud…
MIWIC25: Jess Matthews, Compliance Governance Officer at Acacium Group
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Helen Oluyemi, Information Security Manager at Pollinate International Limited
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
SandboxAQ Launches AQtive Guard to Secure Billions of AI-Driven Non-Human Identities
As AI agents proliferate across enterprise networks, posing a new wave of intelligent and adaptive cyber threats, SandboxAQ has launched a platform designed to meet the moment. The cybersecurity and quantum tech firm today unveiled AQtive Guard, a new solution…
ISACA and Chartered IIA pen open letter to UK Government urging swift audit reform to build digital resilience
ISACA and the Chartered Institute of Internal Auditors (Chartered IIA), have sent a letter to Rt Hon Jonathan Reynolds MP, Secretary of State for Business and Trade, stressing the urgent need for audit reform legislation to boost digital resilience. The…
Entrust Announces all-in-one Cryptographic Security Platform
Entrust has announced the Entrust Cryptographic Security Platform, for release in May. The platform is a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks on data security and identity systems are exploding in scale and sophistication.…
9 Modern Ways You Can Use Bitcoin in 2025
Cryptocurrency is slowly becoming a regular way to pay for something, with new uses popping up every day. Many people choose Bitcoin, among others, because it’s easy to use, quick, secure, private, and more affordable than traditional methods. 1. Gaming,…
Bridewell research finds UK Financial Services under pressure from cyber security challenges and mounting regulatory requirements
Research from Bridewell, a leading UK-based cyber security services provider, has found compliance with regulation as the chief challenge, as well as the main stimulus, for increasing cyber security maturity in the financial services sector. The study, entitled Cyber Security…
MIWIC25: Sochima Okoye, Cybersecurity Consultant at CSA Cyber
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Anastasiia Ostrovska, co-founder & CEO Women’s Leadership and Strategic Initiatives Foundation (WLSIF)
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Katie Beecroft, Associate Director Risk & Security, Fidelity International
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Lisa Landau, CEO and Co-Founder of ThreatLight
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
From $2M to $750M: Phaneesh Murthy’s Blueprint for Exponential Growth in Technology Services
In the competitive landscape of global technology services, few executives can claim the kind of transformative growth that Phaneesh Murthy has orchestrated throughout his career. His most remarkable achievement came during his tenure at Infosys, where he helped scale…
MIWIC25: Michelle Corrigan, Director of Digital Care Hub
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Identity Fraud Costs Orgs Average of $7m Annually
New research has revealed the escalating cost of identity fraud and the impact it has on organisations. The research, a joint global study by Entrust and Docusign, showed the trade-offs enterprises face between security and customer experience. The Future of Global Identity…
Salt Security and CrowdStrike Strengthen Partnership
Salt Security has announced API integrations with the CrowdStrike Falcon® platform to enhance and accelerate API discovery, posture governance and threat protection. This integration allows for rapid API discovery through a new Foundry application and provides real-time threat insights via…
Bridewell appoints Sam Thornton as COO to strengthen operations and accelerate growth
Leading UK cyber security firm, Bridewell, has announced the appointment of Sam Thornton as Chief Operating Officer and welcomed him to its board of directors, a move which the company hopes will further strengthen Bridewell’s position as a globally recognised…
4 Tips For Crypto Wallet Security
Cryptocurrency will be more popular in 2025 than it has ever been and this means that there is a greater need for wallet security. As the crypto sector becomes more profitable and popular, malicious actors will look to exploit investors…
Top 5 Web Application Penetration Testing Companies UK
Web Application Penetration Testing (WAPT) is a methodical approach to security that involves ethical hackers simulating real-world cyber-attacks on your web application to uncover vulnerabilities. By mimicking the tactics of cybercriminals, these professionals can identify weaknesses before malicious actors can…
Keeper Unveils Latest WearOS App for Android
Keeper Security has unveiled its latest improvements to the Keeper WearOS app that accompanies their flagship password management solution. The upscaled app enhances security and ease for smartwatch users. The update aligns with Google’s latest Android guidelines, providing a more intuitive…
Q&A: Cybersecurity in ‘The Intelligent Era’
The Gurus spoke to Robert Hann, VP of Technical Solutions at Entrust, about the future of IT and the challenges these developments pose to security teams and business leaders globally. What do you think will be the most significant changes…
SandboxAQ Strengthens Leadership in Post-Quantum Security as NIST Approves HQC Algorithm
The National Institute of Standards and Technology (NIST) has officially added HQC (Hamming Quasi-Cyclic), co-invented by SandboxAQ, to its suite of post-quantum cryptographic (PQC) standards, the company announced today. HQC becomes the fifth algorithm selected by NIST in its ongoing…
Data Connect announces vSOC Assure to streamline cyber risk assessments and increase cyber resilience
Data Connect, a leading cyber security services provider underpinned by elite cyber practitioners and technology, today announced the launch of vSOC Assure. The platform has been developed in response to the growing need for robust, ongoing security assessments and it…
One-third of CNI organisations admit to paying ransomware according to new report from Bridewell
According to new research entitled Cyber Security in Critical National Infrastructure: 2025, from Bridewell, a leading UK-based cyber security services provider, one-third of UK CNI organisations targeted by ransomware admitted to paying the ransom – a practice which has been…
New KnowBe4 Report Reveals a Spike in Phishing Campaigns
KnowBe4, Security Awareness Training leader, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organisations at the start of 2025. Based on data generated by KnowBe4 Defend, this edition…
Over 15 women graduate from new cybersecurity training programme
More than 15 women have graduated from cyberUPLIFT, a new cybersecurity training programme from TECwomen, a community-interest company committed to supporting, training, and building a network for women who work or aspire to work in the Technology, Engineering, and Creative…
Nominations Open for 2025 European Cybersecurity Blogger Awards
Eskenzi PR are proud to announce that nominations are open for the 12th annual European Cybersecurity Bloggers Awards. The 2025 event is sponsored by Keeper Security and Pulse Conferences and supported once again by media partners, Infosecurity Magazine and the…
Tech Show London: Making Dating Scams Less Attractive
Technology has transformed so many areas of our lives and relatively quickly in the grand scheme of things. From tech used to make education more accessible, for example, to the ever talked about artificial intelligence (AI) shaping many sectors, the…
Wellbeing in the Cybersecurity Sector: A Call for Participation
Cybersecurity has a wellbeing problem. One that we, at The IT Security Guru, won’t stop shouting about. We’ve all seen the stats: burnout runs rife throughout cybersecurity, there’s a retention issue, and a sizable skills gap. This, on top of…
New KnowBe4 Report Finds Education Sector Unprepared for Escalating Cyberattacks
KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today announced a new report, “From Primary Schools to Universities, The Global Education Sector is Unprepared for Escalating Cyber Attacks”. The education sector was the most targeted industry for cyberattacks…
Keeper Security Gives Its Partner Programme an update
Keeper Security has announced the launch of the updated Keeper Partner Programme. The updated programme is designed to help organisations of all sizes expand their cybersecurity offerings and unlock new revenue opportunities. As businesses increasingly adopt PAM solutions to protect…
Best WordPress Plugins for Cybersecurity 2025
WordPress is a great platform for building websites, but it is also a common target for hackers. Keeping your website safe is important to protect your data, visitors, and business. Cybercrime is a growing problem, with 39% of UK businesses…
Check Point Software Celebrates Continued Partner Success at UK Partner Awards
Check Point® Software has announced the winners of its UK Partner Awards. The annual awards ceremony, which took place at One Moorgate Place on March 6th, 2025, celebrated the input of Check Point’s affiliate companies and the growing partner community…
Cold Wallets vs. Hot Wallets: Which Offers Better Security?
Cryptocurrency isn’t just a buzzword anymore. By December 2024, the number of global cryptocurrency owners reached approximately 659 million, marking a 13% increase from January 2024. That might not sound like a massive chunk, but it still represents millions of…
Strengthening the Human Firewall: Prioritising Mental Health in Cybersecurity Teams
There are few places more challenging than the frontlines of war. Danger lurks at every corner while enemy fire is a persistent threat. It’s a hostile and stress-induced environment that demands unwavering focus, and where a single error can have…
WatchGuard unveils FireCloud Internet Access
WatchGuard® Technologies, a provider of unified cybersecurity, has announced the launch of FireCloud Internet Access, the first in what it’s describing as “a new family of hybrid secure access service edge (SASE) products”. The company said that FireCloud “uniquely meets…
KnowBe4 research reveals a confidence gap in cybersecurity, putting organisations at risk
KnowBe4, cybersecurity platform that comprehensively addresses human risk management, has released new research indicating that while 86% of employees believe they can confidently identify phishing emails, nearly half have fallen for scams. The study, which surveyed professionals across the UK,…
MIWIC25 – Eva Benn, Chief of Staff, Strategy – Microsoft Red Team
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Advancing Gender Equality in 2025 and Beyond
International Women’s Day (IWD) 2025 carries the powerful theme: ‘Accelerate Action.’ This theme calls on individuals, communities, and organisations to take decisive steps toward achieving gender equality. Despite ongoing efforts, at the current rate of progress, it will take until…
KnowBe4 Wins Cybersecurity Company of the Year at the 2025 teissAwards
KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today announced that it has been awarded first place in this year’s teissAwards Cybersecurity Company of the Year category for enterprise organisations. The teissAwards celebrate excellence in cyber and information security,…
SandboxAQ Joins UN AI Hub to Bolster Cybersecurity and Drive AI Innovation
SandboxAQ has joined the United Nations International Computing Centre (UNICC) as a founding member of its newly launched AI Hub, a global initiative designed to provide AI-driven solutions and expertise to more than 100 UN entities and international organisations. The…
Enhancing security with Microsoft’s expanded cloud logs
Nation-state-sponsored hacking stories are a big part of everyone’s favourite Hollywood movies — that is, until it becomes a real-life story of our own compromised personal or corporate sensitive data ending up on the dark web or in hackers’ hands. In real…
Winners of Most Inspiring Women in Cyber Awards 2025 Revealed
The 20 winners of the Most Inspiring Women in Cyber Awards were announced at a ceremony held at the iconic BT Tower in London on the 26th February 2025. The awards celebrated the achievements of women working in cybersecurity around the…
Tarlogic Discovers Security Flaw Allowing Eavesdropping on Private Conversations Via Bluetooth Headset Microphone
The popularity of Bluetooth devices has surged over the years thanks to their convenience and wireless connectivity. The Bluetooth protocol allows and streamlines the setup and discovery of services between a wide range of devices. Bluetooth technology allows users to…
Almost All Organisations Experienced API Security Issues in Past Year
The latest State of API Security Report by Salt Security has highlighted the ongoing challenges faced by organisations in securing their application programming interfaces (APIs). The Salt Labs State of API Security Report Q1 2025 draws on survey responses from…
How to Protect Your Digital Identity While Gaming Online
Playing games online provides entertainment but exposes you to specific dangers during gameplay. Hackers and scammers specifically target your personal data, payment specifics, and gaming account information. Cybercriminals steal money and account credentials through phishing attacks, malware, and unsecured systems.…
Cybersecurity Leaders Convene in Belfast to Tackle Evolving Digital Threats
Cybersecurity professionals from across Northern Ireland gathered at Titanic Belfast on February 13 for Check Point Software‘s second Cyber Leader Summit, a high-profile event aimed at strengthening Ireland’s digital defences. The summit brought together government officials, business leaders, and security…
ACDS Unveils New Updates to EASM Platform, Enhancing Security For Enterprises
Advanced Cyber Defence Systems (ACDS) has unveiled various updates to its EASM tool, Observatory. Its new capabilities include an ability to monitor for leaked AWS access and secret keys, as well as a new detection feature for software supply chain…
Keeping DEI on the Agenda: Most Inspiring Women in Cyber Award Organisers Set Panel Topic
Eskenzi PR, organisers of The Most Inspiring Women in Cyber Awards, are proud to announce the theme of this year’s event panel discussion: Keeping DEI on the agenda: progressing, not regressing. The panel topic, informed by ideas submitted by nominators,…
Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour
The common maxim in cybersecurity is that the industry is always on the back foot. While cybersecurity practitioners build higher walls, adversaries are busy creating taller ladders. It’s the nature of the beast. A prime example is multi-factor authentication (MFA),…
How Safe Are Online Entertainment Platforms?
The shift towards online entertainment services in the US can be explained by the proliferation of mobile devices and improved internet access. It is estimated that more than 97% of the US population currently has online access, with 96% owning…
Bridewell and I-TRACING Form Strategic Partnership
Today, I-TRACING and Bridewell, have announced a strategic partnership to create a strategic partnership to create the leading independent European cyber security services provider. The partnership is backed by the founders and managing partners of I-TRACING—Theodore Vrangos, Michel Vujicic, and…
How Secure Are Gaming Transactions: Crypto, Credit Cards, and Wallet Apps Compared
In a consumer survey toward the end of last year, 48% of respondents said they used an e-wallet to pay for items, a jump of 12% from the prior year. This increase suggests a growing desire for safer ways to…