Tag: IT SECURITY GURU

Keeper Introduces Major Password Manager Update for iOS

Keeper Security has announced the Keeper Password Manager app for iOS, which features a brand new, more modern User Interface (UI). This highly-anticipated release includes improved usability, smart searching and faster sync times for customers with large vaults, such as…

Bridewell announces CHECK penetration testing accreditation from NCSC

Bridewell, a leading UK cyber security firm, today announces that it has been accredited by the Government’s National Cyber Security Centre (NCSC) to provide CHECK penetration testing to government, public sector bodies and organisations under the UK’s critical national infrastructure…

KnowBe4 Opens New Office to Bolster UK’s Northern Powerhouse

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, is proud to announce the opening of its new UK headquarters in Leeds. This expansion marks an exciting milestone for KnowBe4, showcasing Leeds’ burgeoning reputation as…

Payment diversion fraud poses significant threat to businesses

Nearly a quarter (24%) of businesses across the UK experienced payment diversion fraud in 2022 according to data from the Hiscox Cyber Readiness Report*. Payment diversion fraud (PDF) involves cyber criminals posing as a trusted supplier and manipulating individuals within…

The most surveilled football stadiums around the world

Comparitech recently conducted research into exactly this, looking at the top 100 stadiums in world football around the world, to figure out which football fans are the most watched. They have collated the number of cameras found in each stadium,…

Blame Culture: An Organisation’s Ticking Time Bomb

An organisation’s attitudes to cybersecurity are almost as important as the steps taken to prevent such attacks. Regardless, when something does go wrong, blame culture tends to run rife. With rising fear of litigation, a human tendency to want to…

Top 10 riskiest assets threatening global business

Today, Armis released new research identifying the riskiest connected assets posing threats to global businesses. The company’s findings highlight risk being introduced to organisations through a variety of connected assets across device classes, emphasising a need for a comprehensive security…

FutureBank and IDVerse Partner to Fight Cybercrime

The customisable and compliant embedded finance platform, FutureBank, has partnered with world-leading digital ID verification company IDVerse (previously known as OCR Labs Global) to further its digital transformation and accelerate customer onboarding through swift and secure digital identity verification (IDV).…

The importance of CISOs is not recognised by senior leadership

Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership. That’s according to research from cyber security solutions provider BSS, which explores ‘How CISOs can succeed in a challenging landscape’.  Of the 150 UK-based…

Popular ‘As-a-Service’ Operations Have Earned Cybercriminals over $64m

In 2019, cybersecurity firm Group-IB exposed a Russia-based scam-as-a-service operation. This scheme, initially known as Classiscam, employed counterfeit classified advertisements and social engineering tactics to deceive individuals into purchasing non-existent products or services. Victims were manipulated into transferring money directly…

Esteemed Cybersecurity PR Agency Turns 28

Today, award-winning cybersecurity PR agency, Eskenzi PR, turns 28. The agency, founded in 1995 by Yvonne Eskenzi and Neil Stinchcombe, has worked with some of the largest names in the cybersecurity industry and helped many organisations through sales, acquisitions and…

NCSC issues warning over chatbot cyber risks

British officials are warning organisations about integrating artificial intelligence-driven chatbots into their businesses, saying that research has increasingly shown that they can be tricked into performing harmful tasks. In a pair of blog posts due to be published Wednesday, Britain’s…

Cyber Mindfulness Corner Company Spotlight: Egress

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Jack Chapman, VP of Threat Intelligence at Egress, spoke to the Gurus about the human side of phishing, leading…

Five processes every organisation needs for successful BizDevOps

BizDevOps in a nutshell Many organisations claim to be data-centric and data-driven. Making informed decisions based on what their organisation’s data is telling them. But how many organisations can truly say they have an effective and operational Data Management framework…

The Vanishing Data Loss Prevention (DLP) Category

A few years ago, DLP was a hot security buzzword and a relevant single offering. Now, it’s been swallowed up as part of other, beefier solutions that offer a buffet instead of an entrée. However, to understand where to find…

Southampton FC Renews Partnership with Acronis

Southampton FC officially announced its renewed partnership with Acronis and Tailor Made Technologies (TMT)  today. Under the agreement, TMT will be providing the team with a full suite of Acronis cyber protection solutions to protect the team’s data assets and…

BT joins line-up for Wales Tech Week

Wales Tech Week has today unveiled BT as the partner for the summit’s Connectivity Zone, reaffirming its commitment to advancing digital transformation and innovation within Wales’s technology industry.  BT’s wealth of experience and their technology demos will offer attendees valuable…

How poor cybersecurity policies disrupt business continuity

As the world moves increasingly online, risk management professionals and business owners must continue to invest in the prevention of cyber threats. It’s surprising, to see just how many businesses have plans in place for all sorts of things such…

Lessons From the 2023 National Risk Register Report

Cybersecurity is a matter of national and international security and should be prioritised as such. This is particularly important when it comes to protecting Critical National Infrastructure (CNI) and the services that UK citizens rely on in their daily lives,…

Cyber Mindfulness Corner Company Spotlight: Netskope

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Ilona Simpson, CIO, EMEA, at Netskope, spoke to the Gurus about the importance of work/life balance, blame culture, and…

DarkInvader Launches Channel Partner Recruitment Drive

DarkInvader, a leading External Attack Surface Management (EASM) provider, launches its channel partner recruitment drive to enable more businesses to monitor and protect their external attack surface. As part of its continued growth, DarkInvader is looking to partner with leading…

Carlsberg Group Selects Cato Networks for Massive Global SASE Deployment

Cato Networks, provider of the world’s leading single-vendor SASE platform, announced Carlsberg Group as its latest enterprise customer. The third largest brewer in the world chose single-vendor SASE to transform its global network and security infrastructure. The Cato deployment will span 200+ locations…

BT lands major network and cyber security deal with NATS

BT today announced it has secured a seven-year deal with NATS, the UK’s leading provider of air navigation services. NATS handles over 2.5 million flights every year and the new long-term contract will strengthen its technology infrastructure by creating a…

Verimatrix Introduces New Website Security Integration

Verimatrix has recently announced the introduction of a novel website security solution, Verimatrix XTD Web Protect powered by Reflectiz. This unveiling took place during the Black Hat USA event last week. The development of these website-oriented security services has been…

Quest Software Update

Quest Software, a systems management, data protection and security software, company, has announced what it calls its latest breakthrough in data management with the launch of erwin Data Modeler by Quest 12.5. Boasting cutting-edge features that enhance data quality, governance,…

Cyber Mindfulness Corner Company Spotlight: Mimecast

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Johan Dreyer, Field CTO, EMEA, at Mimecast, tells the Gurus about burnout, leading by example, and the future of…

1 in 5 CIOs Believe Cyber Security Ops Are Not An Immediate Priority

In April 2023, Acora conducted a survey that revealed insights into the changing responsibilities of Chief Information Officers (CIOs) and their main focuses in mid-market companies in the UK. The research included 126 decision-makers from UK-based financial services companies and…

DTX Europe 2023

DTX brings together creative minds, technical experts and the latest tools needed to drive change and generate value across today’s organisations. “Your Home of Digital Transformation” Covering cloud, networks and infrastructure; data, analytics and AI; software engineering and DevOps; and…

Understanding Changes in the OWASP API Security Top 10 List

The Open Web Application Security Project (OWASP),  a non-profit foundation devoted to web application security, recently released the 2023 OWASP API Security Top 10 list. The list aims to raise awareness about the most common API security risks plaguing organisations…

History’s Greatest Insider Threats

One of the most difficult problems for security professionals to grapple with is defending against dangers that come from within an organisation. Unfortunately, protecting against insider threats is often more complicated than traditional threat prevention. There are many different ways…

Cyber-attack hits the UK’s electoral registers

Confidence in the UK’s electoral authority has been cast into doubt following the revelation of a malicious cyber-attack that infiltrated the records of 40 million voters, remaining undetected for a year. Shockingly, this breach was not disclosed to the public…

Data Protection and Digital Information Bill – what are the changes?

Everyday I’m immersed in the challenges faced by organisations and individuals navigating the complex world of Data Protection. Recently, this has been compounded by the developments surrounding the Data Protection and Digital Information Bill, after the government released a keeling…

Ransomware on manufacturing industry caused $46bn in losses

Between 2018 and 2023, 478 manufacturing companies have suffered a ransomware attack, leading to a loss of approximately $46.2 billion in downtime alone. Serious cyber incidents affecting manufacturing companies can lead to significant disruptions to production lines. As a result,…

Keeper empowers cybersecurity advocates with new Influencer Programme

Keeper Security has announced the launch of its groundbreaking Keeper Influencer Program. This unique initiative aims to collaborate with content creators from all social media platforms who are passionate about cybersecurity and eager to share their experiences using Keeper’s industry-leading password…

Synopsys Launches Software Risk Manager to Simplify Enterprise-Scale AppSec

In today’s ever-evolving landscape, organisations recognise that software risk directly impacts their business. To effectively handle this risk, the focus is on creating scalable and efficient application security programmes. With the threat landscape becoming more challenging, the demand for streamlined…

Cyber Mindfulness Corner Company Spotlight: DXC Technology

At the IT Security Guru we’re showcasing organisations that are doing great things for employee wellbeing! This week, Mike McDaniel, President of Modern Workplace at DXC Technology, tells the Gurus about how DXC Technology are revolutionising the virtual employee workplace…

MOVEit latest: US Government services provider Maximus hit

The MOVEit attack is constantly evolving and this week a new update has occurred. Maximus Inc., a US government services provider is the latest victim of the Clop ransomware gang’s exploitation of a critical vulnerability within Progress Software Corp.’s MOVEit…

Data Loss Prevention for Small and Medium-Sized Businesses

Hybrid work models and broadly adopted cloud technology disperse operations extensively; data is moved, stored, and accessed from highly distributed locations. Within such a disseminated environment, cybersecurity hygiene concerns businesses and organisations, especially nowadays, where highly skilled cybercriminals become more…

Norway government ministries hit by cyber attack

A recent cyber attack struck a significant blow to the Norwegian government, affecting a total of 12 government ministries. In response to this alarming situation, a crisis staff was promptly assembled. The government minister in charge of handling the response…

Millions of Keyboard Walk Patterns Found in Compromised Passwords

Today, the Specops Software research team revealed the results of their latest findings on the use of keyboard walk patterns in compromised passwords. The top keyboard walk pattern found in compromised password was ‘qwert’, followed by ‘qwerty’ which found in…

Dragos Accelerates Growth in Europe, Expands Leadership Team

Today, Dragos Inc., who provide cybersecurity protection for industrial controls systems (ICS) and operational technology (OT) environments, announced its deepening commitment to Europe to provide industrial and critical infrastructure organisations in the region with the Dragos Platform, threat intelligence, and services…

Lookout Announces Operations in Mainland China

Yesterday, Lookout, Inc. announced Lookout China Connect, an extension of the Lookout Cloud Security Platform operating in mainland China. Lookout China Connect simplifies connectivity for remote workers in mainland China without the complexity of a private network, all while complying with…

Security Serious Unsung Heroes Awards 2023 have launched

Eskenzi PR has today opened nominations for its eighth annual Security Serious Unsung Heroes Awards. The awards are all about celebrating the UK’s cybersecurity professionals, teachers, lecturers, leaders and those working to make the industry not only more secure, but…

HCA Healthcare Falls Victim to Data Security Incident

One of the largest healthcare providers in the US, HCA confirmed the breach on Monday 10 July. The data was taken from an external storage location exclusively used to automate the formatting of email messages. Taken from its statement, HCA…

Cato Networks Extends ZTNA to Protect Against Insider Threats

Cato Networks, provider of the world’s leading single-vendor SASE platform, addressed mounting security concerns posed by insider threats. Over the past two years, incidents related to insider threats have grown 44%, according to the Ponemon Institute,1 with the cost per…

Cyber Mindfulness Corner Company Spotlight: Exabeam

At the IT Security Guru we’re showcasing organisations that are doing great things for employee wellbeing! This week, Gianna Driver, Chief Human Resource Officer at Exabeam, tells the Gurus about how Exabeam are championing wellbeing support within the organisation. Driver…

Over Half of People Have Felt Socially Excluded In Past Year

New research from health provider Bupa in partnership with ParalympicsGB found that 58% of Brits have felt excluded in the past year, resulting in poor mental health (30%) and isolation (41%). The research also found that feelings of exclusion has…

Breaking it Down: What You Need to Know About Data Breaches

One of the most pressing cybersecurity concerns for organisations today is preventing the exfiltration of sensitive data. Even companies whose main focus is not digital or technological in nature have to manage, store, send, and receive considerable amounts of data…

Why Schools are Low-Hanging Fruit for Cybercriminals

Hackers are increasingly targeting schools as technology is being integrated more deeply into teaching. Educational institutions own many sensitive data, such as personnel and financial information, as well as intellectual property. Unfortunately, many schools lack adequate cybersecurity measures, making them…