Tag: IT SECURITY GURU

Cyber Mindfulness Corner Company Spotlight: Jamf

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Aaron Webb, Senior Product Marketing Manager at Jamf, spoke to the Gurus about how leaders can approach the burnout crisis…

Own Company Unveils New Channel Partner Program

Own Company, a leading SaaS data platform, today announced the launch of a global Channel Partner Program aimed at empowering resellers and system integrators to proactively prevent their customers from losing mission-critical data and metadata. With automated backups and rapid,…

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven…

Verizon Breach – Malicious Insider or Innocuous Click?

A household name among American media companies, Verizon Communications on Wednesday began notifying employees that an insider may have gained access to their data. According to the breach notice to the Maine Attorney General, an unauthorized employee opened a file…

Keeper Security Available on Apple Vision Pro

Password manager Keeper Security announced this week that users can log in to applications on the new Apple Vision Pro™ with Keeper, providing secure and seamless access to content on the revolutionary new device. As spatial computing becomes a reality…

Safer Internet Day: Cybersecurity Experts Weigh In

Happy Safer Internet Day to all those who celebrate! Cybersecurity experts from across the industry have weighed in on how we can use the internet in a safer way, both professionally and personally, in an age of increasing attacks and…

What is HTTP Request Smuggling and HTTP/2 Downgrading?

Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result…

Salt Security Joins AWS Lambda Ready Program

Today, API security company Salt Security has announced that it has been accepted to the Amazon Web Services (AWS) Lambda Ready Program. Salt now supports and simplifies deployments to AWS Lambda, allowing customers to capture API traffic flowing through serverless environments…

Data Privacy Day 2024: Part 1

With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Allon Mureinik, senior manager, software engineering at the Synopsys Software Integrity Group: “In today’s world of social media and open-source development, sharing…

Data Privacy Day 2024: Part 2

With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Alex Hazell, Head of Legal and Privacy for Acxiom EMEA, says: “In 2024, we can no longer discuss data privacy without talking…

Nineteen Group acquires SASIG

Today, the award-winning Nineteen Group, who runs a number of industry events and exhibitions such as the International Cyber Expo, has announced that it has acquired The Security Awareness Special Interest Group (SASIG), a networking and thought leadership forum for…

Cato Networks Introduces World’s First SASE-based XDR

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world’s first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato…

Public Sector Cyberattacks Rise By 40% in 2023

Cyber attacks against government agencies and public sector services increased by 40% in the second quarter of 2023 compared to the first, a new report by KnowBe4 has highlighted. The Cybercrime in the Public Sector report examines the most popular…

23andMe shifts blame to users for data breach

The DNA testing company 23andMe has had a rough few months – first reported in October that data had been breached – and now, the response to those breaches due to customers taking legal action against the company. In an…

Q&A: Supporting SOC Teams and Avoiding Burnout

We know that burnout is a problem for many people across the cybersecurity industry. We also know that in order to be the most secure we can be, we have to support those who secure us, whether that’s through burnout…

The best iOS fax app to protect your privacy

Mobile faxing is experiencing a significant surge in popularity, driven by both businesses and individuals seeking paperless alternatives. Unsurprisingly, many are now opting for mobile fax apps. If you’re an iPhone user on the lookout for a mobile fax app,…

VPN to protect against DDoS attacks on Twitch

Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it…

Cyberelements Launches Dedicated MSP Program

Today, Zero Trust Privileged Access Management (PAM) platform cyberelements have launched their Managed Security Provider (MSP) Program enabling partners to increase revenues and deliver a pioneering Zero PAM platform that is set to transform how organisations secure access for standard…

New Synopsys Report Reveals Application Security Automation Soars

Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services,…

Google bins inactive accounts

Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…

Cyber Mindfulness Corner Company Spotlight: Pentest People

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Gemma Gilderdale, Head of People at Pentest People, spoke to the Gurus about Pentest People’s innovative wellbeing support, the future…

Equal Pay Day: Women, Cybersecurity, and Money

Let’s talk about women – and money. Today (22nd November 2023) marks the day that women effectively stop being paid for the year. Stop being paid against their male counterparts for the same work that they do – for the…

Cato Networks Named SASE Leader, Again

Today, Cato Networks, announced its recognition as a Leader in both the Frost Radar™: Global SASE, 2023 by Frost & Sullivan and the Market Radar: SASE 2023 by Omdia. “Once again, Cato Networks and our cloud-native SASE platform have been…

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…

Can bcrypt Passwords Be Cracked?

Specops Software, an Outpost24 company, have released new research about bcrypt-passwords – and how easy (or not) they are to crack. This research follows previously released data on how long it takes attackers to brute force MD5 hashed user passwords with…

Top 5 Risks of Artificial Intelligence

Artificial intelligence (AI) technology functions in a manner that helps ease human life. Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Unlike humans, who are…

Centripetal Expands Channel Program With Irish Renaissance Partnership

Today, intelligence-powered cybersecurity pros Centripetal have announced a strategic partnership with Renaissance, the leading Irish value-added distributor in Ireland. This collaboration marks a significant milestone in bolstering Ireland’s cybersecurity landscape and underscores the commitment to combating the rising tide of…

SoSafe Pioneers Personalised Approach to Awareness Training

Security awareness and training company SoSafe has announced the launch of the next-generation of personalised learning. The news was revealed at their Human Firewall Conference earlier this week. This latest innovation aims to make secure behaviour second nature for humans. …

Centripetal Launches Global Partner Program

Today, threat intelligence powered cybersecurity pros Centripetal have  launched their partner program to protect organisations around the world by operationalising threat intelligence to safeguard them from every known cyberthreat.  The Centripetal Global Partner Program gives organisations the opportunity to implement…

The Role of Cyber Wellness in Safeguarding Businesses

As I step out of our London office at lunchtime, I’m bombarded with establishments that promote ‘wellness’ in their description. From the £12 salad bar to the yoga and meditation studio, the nail salon to the library, I’m faced with…

Keeper Security Announces Integration with ServiceNow

Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect…

Bitwarden Revolutionises Online Security with Passkey Management

Bitwarden has introduced a ground-breaking feature: passkey management. This innovation empowers every Bitwarden user to create, handle, and securely store passkeys within their vaults. With the Bitwarden web extension, users can effortlessly and securely access passkey-enabled websites. These synchronised passkeys…

Remember, Remember: Guy Fawkes and Cybersecurity

In the UK on November 5, we celebrate ‘Guy Fawkes Night’ or ‘Bonfire Night’ often with fireworks and bonfires. Yet, had Guy Fawkes and his conspirators succeeded with the Gunpowder Plot in 1605 to kill King James I and his…