KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, announced that cybersecurity industry veteran Bryan Palma has been appointed president and chief executive officer of KnowBe4, effective May 5. KnowBe4’s founder and current chief executive officer Stu Sjouwerman has…
Tag: IT SECURITY GURU
Q&A – Securely Yours: An Agony Aunt’s Guide to Surviving Cyber
What happens when two titans of cybersecurity (Rebecca Taylor, Threat Intelligence Knowledge Manager and Researcher at Secureworks, a Sophos company, and Amelia Hewitt, Founder of CybAid and Managing Director at Hewitt Partnerships) join forces to write a book? Securely Yours:…
SOCRadar Launches AI-Powered Cybersecurity Assistant ‘Copilot’
At RSAC 2025, SOCRadar have unveiled SOCRadar Copilot, an AI-powered cybersecurity assistant designed to enhance platform efficiency, share knowledge and insights, and automate routine security operations. It will help time-strapped security teams to streamline security processes and reporting, all while…
Salt Security Launches the First MCP Server to Revolutionise API Security in the Age of AI
API security pros Salt Security have announced the launch of the Salt Model Context Protocol (MCP) Server at RSAC 2025, giving enterprise teams a novel access point of interaction with their API infrastructure, leveraging natural language and artificial intelligence (AI). Built on…
Keeper Security Enhances Browser Extension With New Autofill Controls, PAM Support And Snapshot Tool
Keeper Security has announced the launch of its Browser Extension 17.1. The significant update to Keeper’s award-winning cybersecurity software brings enhanced autofill customisation to its browser extension, along with expanded PAM capabilities and a new AI-powered tool to improve issue…
6 Best CMMC Consulting Services for Small Businesses
The best CMMC consulting service for small businesses can help you stay competitive and compliant in the defense space. CMMC — or Cybersecurity Maturity Model Certification — is a security framework developed by the U.S. Department of Defense (DoD) to…
MIWIC25: Caroline Kamper, Strategic Cyber Threat Intelligence Analyst, SecAlliance
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
New research by Logicalis reveals that CIOs are struggling to derive value from security investments amid changing threat landscape. According to its annual CIO Report, which surveyed 1,000 global IT leaders, more than half say their security patch systems have…
Organisations Unprepared For Age of Quantum Computing
New research by ISACA has found that quantum computing, and the changes it will bring, is broadly welcomed by over half of cyber and IT professionals as a way of creating new opportunities for business. A further 44% believe quantum…
Huntress Unveils Enhanced Identity Threat Detection & Response Solution as New Research Warns of Rising Identity-Based Attacks
Huntress today announced major enhancements to its Managed Identity Threat Detection and Response (ITDR) solution, delivering a purpose-built answer to disrupt hacker identity tradecraft. Alongside the launch, Huntress also revealed new research underscoring the growing threat of identity-based attacks and…
Drained Wallets: How to Protect Your Assets From Advanced Phishing Scams
With the rapid expansion of technological advancements, there have been many great innovations across various industries that have had a positive impact on the world. However, these advancements also mean the latest technologies may not always be used for legal…
Check Point and Illumio Team Up to Advance Zero Trust with Unified Security and Threat Prevention
Check Point Software Technologies and Illumio have announced a strategic partnership aimed at helping organisations enhance their Zero Trust strategies and proactively contain cyber threats. The integration brings together Check Point’s Infinity Platform, which includes Quantum Force firewalls, Infinity ThreatCloud…
MIWIC25: Jess Matthews, Compliance Governance Officer at Acacium Group
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
MIWIC25: Helen Oluyemi, Information Security Manager at Pollinate International Limited
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
SandboxAQ Launches AQtive Guard to Secure Billions of AI-Driven Non-Human Identities
As AI agents proliferate across enterprise networks, posing a new wave of intelligent and adaptive cyber threats, SandboxAQ has launched a platform designed to meet the moment. The cybersecurity and quantum tech firm today unveiled AQtive Guard, a new solution…
ISACA and Chartered IIA pen open letter to UK Government urging swift audit reform to build digital resilience
ISACA and the Chartered Institute of Internal Auditors (Chartered IIA), have sent a letter to Rt Hon Jonathan Reynolds MP, Secretary of State for Business and Trade, stressing the urgent need for audit reform legislation to boost digital resilience. The…
Entrust Announces all-in-one Cryptographic Security Platform
Entrust has announced the Entrust Cryptographic Security Platform, for release in May. The platform is a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks on data security and identity systems are exploding in scale and sophistication.…
9 Modern Ways You Can Use Bitcoin in 2025
Cryptocurrency is slowly becoming a regular way to pay for something, with new uses popping up every day. Many people choose Bitcoin, among others, because it’s easy to use, quick, secure, private, and more affordable than traditional methods. 1. Gaming,…
Bridewell research finds UK Financial Services under pressure from cyber security challenges and mounting regulatory requirements
Research from Bridewell, a leading UK-based cyber security services provider, has found compliance with regulation as the chief challenge, as well as the main stimulus, for increasing cyber security maturity in the financial services sector. The study, entitled Cyber Security…
MIWIC25: Sochima Okoye, Cybersecurity Consultant at CSA Cyber
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…