This week, Obsidian Security, announces the appointment of Sunil Seshadri to its Board of Directors. Sunil joins the board at a time when the Obsidian platform has become essential to Incident Response providers around the world as they respond to…
Category: IT SECURITY GURU
KnowBe4 Launches Ransomware Awareness Month With IT Resource Kit at No Cost
With July being Ransomware awareness month, KnowBe4 has released a ransomware resource toolkit at no cost for organisations and IT managers as part of a dedicated, month-long campaign in July to increase awareness about ransomware attacks. Ransomware is a malicious…
How AI Tool Marketplaces Are Revolutionising Business Efficiency
In today’s fast-paced digital world, businesses constantly seek ways to enhance efficiency, streamline operations, and stay ahead of the competition. One of the most transformative developments in recent years has been the rise of AI tool marketplaces. These platforms offer…
New Cato Networks MSASE Framework Gives Vendor-Like Powers to Channel Partners
Since Gartner officially defined Secure Access Service Edge (SASE) in 2019, many organisations have eagerly embraced this next-generation solution. SASE allows organisations to elevate existing problems, with simplicity, reliability, flexibility and automation. As many organisations turn to the cloud to…
New body IMCSO to elevate standards and streamline provisioning of cybersecurity services in Maritime
The maritime industry is vitally important to the global supply chain for multiple reasons, from food, medicine and consumer goods to fuel and other important products. But with any key industry, comes an opportunity for criminals to exploit and disrupt…
Community Corner: CybAid
Community is exceptionally important to the team at the IT Security Guru. We believe that building community and supporting one another is where our industry thrives, that’s why we’re platforming charities and networks that work within the industry, as well…
Telcos Hit Hardest by Cloud Malware, Report Finds
Telecom companies are being targeted by malicious actors at an alarming rate, according to a new report by Netskope Threat Labs. The report highlights a concerning trend of attackers exploiting popular cloud apps like Microsoft OneDrive and GitHub to deliver…
Obsidian Security Partners with Databricks to Bolster SaaS Data Governance
Obsidian Security, the pioneer of SaaS security, announced today a strategic partnership with Databricks, the Data and AI company. This alliance strengthens the security of applications built on the Databricks Data Intelligence Platform and helps customers enact their data security and…
AI Receptionists For GPs Launched By Customer Service Firm InTouchNow
AI receptionists for GPs and medical practices are now being operated throughout the country, thanks to the help of customer service centre, InTouchNow. The Hertfordshire-based company has been trading for 30 years and has developed its own technology and softwares…
Salt Security Survey Reveals 95% of Respondents Experienced API Security Problems in Past Year
API security professionals at Salt Security have revealed the findings of their latest Salt Labs State of API Security Report, 2024. The research, which analysed survey responses from 250 IT and security professionals, combined with anonymised empirical data from Salt…
Defending your ever-changing attack surface
The very elements crucial for a business’s functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas,…
Why ransomware is still important to business resilience
Ransomware may be an old technique, however, due to increasing levels of digital connectivity, are witnessing a proliferation of ransomware attacks in recent years, which pose significant threats to individuals, businesses, and entire industry sectors industries. Ransomware, in its current…
Outpost24 Launches Exposure Management Platform To Help Organizations Reduce Attack Surface Risk
Outpost24 has launched its Outpost24 Exposure Management Platform, a new integrated exposure management solution designed to empower organizations to continuously monitor and proactively remediate threats against the growing attack surface. As a result of digital transformation, increased adoption of SaaS…
Survey Finds Growing Number of Tech Tools Makes Cybersecurity Professionals Feel “Out of Control”
New research reveals that nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. The new research by Keeper Security also revealed that cybersecurity professionals, on average, have been left grappling with 32 different security solutions…
Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns
A new threat actor group known as Gitloker has launched an alarming campaign that wipes victims’ GitHub repositories and attempts to extort them. Victims are finding their repositories erased, replaced only by a solitary README file bearing the message: “I…
Men’s Mental Health Week: Resource Guide
10th – 16th June 2024 is International Men’s Mental Health Week. It may feel like there are too many ‘awareness dates’, however this week is especially important. Men are far less likely to talk about mental health than women (it…
Finance Phantom Review – A Crypto Trading Robot that Can Be Your Guardian Too
Entering the world of crypto trading is easy, but if you have plans to stay there on a long-term basis then you have to acknowledge all the ups and downs of it. This constant fluctuation won’t stop but what you…
Is Your Business Under Attack From AI?
Artificial Intelligence (AI) is highly innovative but also poses significant risks to all organisations, as shown by the recent high profile hacks at Ticketmaster, Santander and the NHS. This article will delve into how AI can be manipulated by cyber…
The role of unstructured data and Large Language Models in securing data
Advancements in Artificial Intelligence (AI) and Machine Learning (ML) have lowered the barrier of entry for non-security users to independently develop and manage their own data products, which when decentralised to enable separate cross domain data analysis is known as…
Strategies to Manage and Reduce Alert Fatigue in SOCs
The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two…
9 out of 10 businesses seek AI-led threat detection and vulnerability management
OpenText today released the findings of its annual OpenText Cybersecurity Global Managed Security Survey. The 2024 survey of over 1,500 Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) found that the majority (92.5%) see increasing AI-led security and…
Elevating threat detection and response to a new level
Cybersecurity platforms have emerged as indispensable assets for threat detection, response and management. They proactively keep tabs on network traffic, user behaviour and system activities to identify and mitigate risks before they escalate into potentially catastrophic breaches. Yet, the efficacy…
#MIWIC2024 One To Watch: Jasmine Eskenzi, Founder and CEO of The Zensory
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Ones to Watch winners…
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2024
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Tapa Tapa, London, on the 5th June 2024. The awards celebrated the industry’s best blogs, podcasts, and vlogs, as well as the exceptional talent who…
5 Tips for Improving Your Business Security
When it comes to data security, you might think of firewalls, encryption, or vulnerability scanning. However, many businesses overlook the role of physical security in safeguarding their card data. However, there are numerous methods for data thieves to gain access…
Everything You Need to Know About Cross-Site Scripting
Cross-Site Scripting (XSS) is a sneaky security flaw that lets attackers inject malicious code into seemingly harmless websites. In this article, let’s dive deep into the world of XSS, exploring its different forms, the kind of damage it can cause,…
Medical Software: Advancements and Security Concerns in 2024
In recent years, the landscape of healthcare has experienced digital transformation just like any other industry. And telemedicine is at the forefront of this transformation. As we navigate through a world where convenience meets necessity, software emerges as the unsung…
5 Ways to Strengthen the Weak Link in Cybersecurity
In the current era, proactive cybersecurity steps are essential to upholding a strong cybersecurity stance. A vital investment worth considering is a vulnerability management platform, also known as an exposure management platform, which can enhance preventive cybersecurity measures for businesses…
What Are the Benefits of Choosing an AI Trading Bot?
Artificial Intelligence (AI) is making headlines in different industries because of its application. The case is no different when it comes to crypto trading. Many AI crypto trading bots are now available in the market that can help traders make…
What Are the Benefits of Choosing an AI Trading Bots?
Artificial Intelligence (AI) is making headlines in different industries because of its application. The case is no different when it comes to crypto trading. Many AI crypto trading bots are now available in the market that can help traders make…
Solaris SE partners with Salt Security
Salt Security, the leading API security company, today announced that Solaris SE, Europe’s leading embedded finance platform, has deployed Salt Security’s API Security Platform to secure the company’s expanding API ecosystem. Solaris’ technology enables businesses to seamlessly provide exceptional financial experiences to their…
Centripetal Expands Portfolio with DNS Offering
Centripetal, the global leader in intelligence powered cybersecurity, today announced that it is expanding its offering to include CleanINTERNET® DNS to pre-emptively safeguard businesses against web-based cyber threats. Unlike other DNS filtering products that rely solely on blocklists, CleanINTERNET® DNS…
#MIWIC2024 One To Watch: Ellie Calver, Cybersecurity Apprentice at BT
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Ones to Watch winners…
Keeper Unveils Revamped Browser Extension
Password pros at Keeper Security have announced the rollout of an upgraded User Interface (UI) for its browser extension – now available across all supported browsers. With a modernised design and simplified process of finding and creating records for users, the…
GDPR Turns Six: Reflecting on a Global Privacy Benchmark
The EU’s flagship data protection law, the General Data Protection Regulation (GDPR), celebrated its sixth anniversary on 25th May ‘24. Since coming into effect in 2018, its stringent requirements for enhanced security controls and data privacy have consistently raised awareness…
Monetize Magnet – Understanding What This Crypto CPA Network Provides to Affiliate Marketers
The one thing that every affiliate marketer would want is to have an advanced and robust network by their side. It ensures that you have all the right tools and features to progress with your affiliate marketing efforts. How does…
HR and IT related phishing scams still most popular according to KnowBe4’s latest Phishing Report
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has revealed the results of its Q1 2024 top-clicked phishing test report. The results include the most common email subjects clicked on in phishing tests, reflecting…
With a startup’s assist, the UK Government publishes new AI security guidelines
The British government published a new collection of research reports on the cyber security of AI pulling on sources from the private and public sectors. It includes a broad set of recommendations for organisations prepared by Mindgard, the report’s only…
Prevention Maintenance: Strategies To Bolster Your Organisation’s Cybersecurity
Cybersecurity has never been more critical for businesses. In 2023, an astonishing 50 per cent of companies in the UK reported experiencing some form of cybersecurity breach or attack. This number highlights the widespread nature of digital threats. Today, common…
#MIWIC2024 One To Watch: Valeen Oseh-Ovarah, Founder and CEO of TisOva
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Ones to Watch winners…
Most Companies Affected by Software Supply Chain Attacks in the Last Year, Struggling to Detect and React Effectively
Over the past year, a significant portion of global organisations (54%) experienced software supply chain attacks, with many struggling to adapt to the escalating risk environment. These findings stem from ‘The State of Software Supply Chain Security Risk’ report, released…
Cato Networks Partners with e& Further Expanding Global SASE Platform with New UAE PoP
Today, Cato Networks announces a strategic partnership with e& (etisalat and) during International Telecoms Week (ITW) in the United States, a significant move that will see the establishment of a new Point-of-Presence (PoP) within the global technology group’s SmartHub data…
Advanced Cyber Defence Systems Joins Elite Group in Signing CISA’s Secure by Design Pledge
Advanced Cyber Defence Systems (ACDS) has today joined the US Cybersecurity & Infrastructure Security Agency’s (CISA) and UK National Cyber Security Centre’s (NCSC) Secure by Design pledge, becoming one of the first 100 companies, alongside AWS, Microsoft, Google, Cisco, and…
Building a diverse and inclusive cyber workforce
At this month’s DTX Manchester, I’ll be taking part in a panel discussion around the importance of inclusion and diversity in cyber recruitment. For far too long cyber security was seen as a man’s sport. Not only did men take…
Public Sector IT is Broken: Turning the System Back On
Today’s IT services within public sector organisations are not adequate for their intended purpose anymore. Security breaches frequently make headlines. Downtime disrupts services and productivity. There is excessive overspending across the UK too. What is worse, all these factors broadly…
#MIWIC2024 One To Watch: Jenny McCullagh, Graduate Cybersecurity Engineer at Leonardo and Co-Founder and Director of CyberWomen Groups C.I.C
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Ones to Watch winners…
Expert Insight: How Diverse Leadership Can Benefit the Security Sector
In today’s business landscape, diverse leadership is essential for driving innovation, improving decision-making, and maintaining a competitive advantage. Historically, STEM sectors have been male-dominated, with strict job descriptions and rigid hiring processes making it difficult for minorities to break into…
Commonly used passwords for new accounts include “User” & “Welcome
New research into password usage for new accounts during the onboarding process, has revealed a worrying trend where easily guessable passwords are left unchanged for new starters, presenting significant security risks for organisations. The findings from Secops Software, an Outpost24…
#MIWIC2024: Jan Carroll, Managing Director at Fortify Institute
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Expert Insight: What’s the key to bringing more diversity into the tech sector?
It’s often argued that the lack of women and non-binary individuals in tech is due to inadequate support, insufficient attention — especially from senior management — and a dearth of those candidates studying subjects such as science, technology, engineering, and mathematics (STEM). It’s a narrative that…
#MIWIC2024: Jan Carroll, Managing Director at Fortify Institute
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
Expert Insight: What’s the key to bringing more diversity into the tech sector?
It’s often argued that the lack of women and non-binary individuals in tech is due to inadequate support, insufficient attention — especially from senior management — and a dearth of those candidates studying subjects such as science, technology, engineering, and mathematics (STEM). It’s a narrative that…
CIOs and CFOs, two parts of the same whole
The business boardroom: a machine that drives corporate strategy and shapes the future of the company. Such a force requires cohesion and alignment, but silos still exist today. One of the biggest divides lies between the Chief Finance Officer and…
TrustRadius recognises KnowBe4 for fifth year running in Security Awareness Training
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, announced that TrustRadius has recognised KnowBe4’s Security Awareness Training and PhishER with 2024 Top Rated Awards. KnowBe4’s Security Awareness Training won in the Security Awareness Training…
How Tech Can Help you Obtain a Building Passport: Net-Zero Building Certification Guide
Net-Zero Building Certification is a credential that identifies structures which have attained parity between the amount of energy they use and how much renewable energy they produce in twelve months’ time. This guide will outline step by step what you…
Expert Insight: ‘Minding the gap’: how can we work to make cyber accessible for women?
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female, and this is down from 22% in 2022. To make matters worse, we’re fighting a losing battle against an ever-increasing…
Registration Opens for International Cyber Expo 2024: Where Cyber Leaders Converge to Shape Tomorrow’s Defences
Today, Nineteen Group has announced the opening of registration for the highly anticipated International Cyber Expo (ICE) 2024. Set against the iconic Olympia London on September 24th and 25th, ICE 2024 promises to be an unparalleled convergence of the brightest…
Salt Security Unveils First AI-Infused API Security Platform to Address Proliferation of GenAI Application Development
This week, Salt Security, a frontrunner in API security, have unveiled its groundbreaking API Security Protection Platform. This platform, powered by Pepper, Salt’s own Large Language Model (LLM) AI, represents a leap forward in API protection. By integrating AI across…
CyberSmart announces expansion into the Australian market with HAT Distribution partnership
CyberSmart, the UK’s leading provider of complete cyber confidence to UK SMEs has announced its partnership with Australian technology distributor, HAT Distribution. The partnership will provide businesses in Australia with fast, hassle-free Essential Eight assessment and year-round assurance. CyberSmart is…
Over 70% of Staff Use AI At Work, But Only 30% of European Organisations Provide AI Training
Today, new research by ISACA has revealed that, despite nearly three quarters (73%) of European organisations reporting that their staff use AI at work, only 30% provide limited training to employees in tech-related positions, while 40% offer no training at…
Cybereason Announces the Availability of Cybereason Mobile Threat Defence in Response to Increases in Sophisticated Mobile Device Attacks
Cybereason has announced the availability of Cybereason Mobile Threat Defence, Powered by Zimperium. With the explosive growth in mobile devices and apps comes an ever-evolving attack surface. Research shows that 60% of endpoints accessing enterprise assets are through mobile devices,…
Cyber Threat Research: Poor Patching Practices and Unencrypted Protocols Continue to Haunt Enterprises
Cato Networks, the SASE leader, today unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report shows all organizations surveyed continue to run insecure protocols across their wide access networks (WAN), making it easier…
Data Brokers: What They Are and How to Safeguard Your Privacy
As more of our personal data is collected online, privacy concerns have increased. With a few clicks, we share intimate details about ourselves. However, most people are unaware of how widely their data spreads. Behind the scenes is an entire…
World Password Day 2024: Try Passkeys!
On this World Password Day, we should all pause and think about how we can adopt passkeys. Passkeys represent a significant industry shift in identity security, moving away from traditional credentials of usernames and passwords to a more secure “no knowledge”…
World Password Day 2024: What are the experts saying?
It’s World Password Day 2024! What’s clear is that passwords and creating and maintaining good password hygiene is still one of the most effective ways to protect businesses. We’ve gathered some insights from cybersecurity experts who have had their say…
Guest Blog: Securing K12 Schools with Centripetal and LANRover
In today’s digital age, where technology is deeply ingrained in our daily lives, ensuring the cybersecurity of our educational institutions has become paramount. K-12 schools are increasingly becoming targets for cyberattacks, highlighting the urgent need for robust cybersecurity measures. With…
Synopsys Introduces Polaris Assist: AI-Powered Application Security Assistant
Synopsys has unveiled Polaris Assist, an innovative AI-powered application security assistant incorporated into the Synopsys Polaris Software Integrity Platform®. Leveraging advanced Large Language Model (LLM) technology alongside Synopsys’ deep knowledge in application security, including robust coding patterns, vulnerability detection rules,…
Keeper Security Forges Cybersecurity Partnership With Williams Racing
Today, Keeper Security joins Williams Racing as an Official Partner on the eve of the F1 Miami Grand Prix. Trusted by thousands of businesses and millions of individuals globally for its zero-trust and zero-knowledge cybersecurity software, Keeper’s branding will appear…
UK to Take Steps in Helping Protect Consumers Against Cyber Threats from Smart Devices
The UK has taken a pioneering step by introducing new laws aimed at safeguarding consumers against hacking and cyber-attacks while using internet-connected smart devices such as baby monitors, televisions, and speakers. Under these new laws, manufacturers are required to adhere…
APIContext’s Global Cloud API Performance Report Show A Decline In Cloud API Availability
APIContext has unveiled its 2024 Cloud Service Provider API Report, offering an in-depth examination of the performance of leading cloud service providers in the essential API domain. This annual global analysis scrutinised data stemming from 650 million API calls across…
Cato Networks to Showcase New Security Evasion Tactics at RSA Conference 2024
Cato Networks, the SASE leader, today announced that Cato CTRL, the SASE leader’s cyber threat intelligence (CTI) research team, will demonstrate threat actors’ latest tactics designed to capitalise on organisations’ complex security architectures during presentations at the upcoming RSA Conference…
Salt Security Enhances API Security Platform with OAuth Protection Package
Salt Security have announced the release of its new multi-layered OAuth protection package to detect attempts to exploit OAuth and proactively fix vulnerabilities. Salt is enhancing its API protection platform with a comprehensive suite of new OAuth threat detections and…
Interview: Cydea’s Risk Management Platform, Understanding Not Eliminating Risk
Last week, the IT Security Guru team attended Cydea’s Risk Management Platform launch in London. After the event, Robin Oldham, CEO and Founder of Cydea, sat down with the Gurus to answer some questions about risk management and why it’s…
Female Tech Duo take Flight to Dubai to Launch the future of Cyber Leadership
Two formidable female tech leaders have joined forces to launch an innovative new leadership development and mentoring platform for the cyber community – Leading Cyber. Danielle Phillips, Founder and Managing Director of Durham based Inside Out, and Director at CyberNorth has collaborated with…
Coalition Finds More Than Half of Cyber Insurance Claims Originate in the Email Inbox
Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes, today published its 2024 Cyber Claims Report, which details emerging cyber trends and their impact on Coalition policyholders throughout 2023. The report found that more…
AI-driven cyber attacks to be the norm within a year, say security leaders
Netacea, the bot detection and response specialist, today announced new research into the threat of AI-driven cyberattacks. It finds that most businesses see “offensive AI” fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face…
Expert Insight: ‘Minding the Gap’: How can we work to make cyber accessible for women?
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female, and this is down from 22% in 2022. To make matters worse, we’re fighting a losing battle against an ever-increasing…
KnowBe4 acquires UK’s Egress to create advanced AI-driven platform to manage human risk
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced it has entered into a definitive agreement to acquire Egress, a leader in adaptive and integrated cloud email security. Egress’ Intelligent Email Security suite…
Google’s Core Update is ‘Biggest’ Algorithm Update in History
Search giant Google is currently undergoing one of its biggest algorithm updates in its history, sources are told. The online search platform which manages more than 8 billion searches per day is doing a significant update to its internal systems…
Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army
Cybersecurity is ‘inclusive’ by nature: no one is exempt from the fallout of the expanding cyber threat landscape. The notion, therefore, that some groups of individuals are offered fewer opportunities to join the cyber industry than others is frankly absurd.…
Mandiant’s M-Trends Report Reveals New Insights from Frontline Cyber Investigations
Mandiant, part of Google Cloud, today released the findings of its M-Trends 2024 report. Now in its 15th year, this annual report provides expert trend analysis based on Mandiant frontline cyber attack investigations and remediations conducted in 2023. The 2024…
#MIWIC2024: Melissa Chambers, CEO and Co-Founder of Sitehop
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
ACDS Launches Revolutionary OBSERVATORY Solution: Redefining Attack Surface Management
Advanced Cyber Defence Systems (ACDS) has unveiled its groundbreaking Attack Surface Management (ASM) solution: OBSERVATORY. Engineered with a comprehensive three-pronged approach—Discovery, Validation, and Insight—OBSERVATORY offers an unparalleled level of network security. As the number of internet-connected devices explodes, organisations struggle…
UK’s Cydea introduces new way to quantify risk management
Cydea, the cyber risk management provider, has announced the Cydea Risk Platform, set to quantify threats in financial terms to businesses, allowing them to visualise the consequences of different business security-related scenarios. By giving a monetary value to risks and…
Report Reveals Healthcare Industry is Disillusioned in its Preparedness for Cyberattacks
Kroll, the leading independent provider of global risk and financial advisory solutions, has released the State of Cyber Defense: Diagnosing Cyber Threats in Healthcare report, exposing the healthcare industry’s disillusionment in terms of its cyber maturity. The research reveals that…
Goldilock Partners with organisation behind NATO’s largest cyber defence exercise
Goldilock, the British cybersecurity startup behind a unique physical network isolation solution, has partnered with CR14, a cyber defence organisation established by the Estonian ministry of defence and host of NATO’s operative Cyber Defence Centre of Excellence (CCDCOE), to conduct…
Police apprehend global cyber gang implicated in large-scale fraud
The Met Police, a long with a host of other global law enforcement agencies, have dismantled a criminal gang that used a technology service to facilitate fraudulent text messages, leading to theft from victims. The scam primarily targeted younger individuals…
Keeper Security Offers Built-In Passphrase Generator to Strengthen Security
Today Keeper Security have announced the addition of a passphrase generator to Keeper Web Vault, with support on mobile and for the browser extension coming soon. The release also includes an update to the existing password generator which provides users…
Human Risk: An Organisation’s Biggest Problem and Greatest Opportunity
Organisations often lean on the ‘People, Process, and Technology’ (PPT) framework as a way of demarcating value streams and driving action. When managed well, the triad works in unison to ensure a comprehensive and layered approach to defence. But what…
Flyfish Review – How Reliable are this Company’s Payroll Management Solutions?
Running a business in today’s competitive landscape can be tough, especially if you want to expand internationally. Doing it alone can be overwhelming, which is why companies like Flyfish can be invaluable. They specialize in corporate payroll solutions and offer…
Pentest People Becomes the First Leeds-based Cybersecurity Company to Achieve NCSC’s Cyber Advisor (Cyber Essentials) Accreditation
Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it is the first Leeds-based cybersecurity company to become a qualified and approved Cyber Advisor (Cyber Essentials) on the NCSC’s Cyber Advisor scheme. Developed in partnership…
#MIWIC24 Cyber Marketeer of the Year: Laura Reilly
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on this year’s winner of the Paula Brici…
The Zensory Partners with UK Cyber Week to Showcase Importance of Inclusivity With ‘The Inclusive Cyber Space’
Popular wellbeing and productivity platform The Zensory have partnered with renowned speaker Holly Foxcroft, Head of Neurodiversity in Cyber Research and Consulting at Stott and May, and NeuroCyber, the organisation dedicated to growing neurodiversity in the cyber sector through inclusive…
Unveiling the Cyber Well-Being Conundrum: Navigating Burnout’s Impact on Charity and SME Cybersecurity
As we delve deeper as an industry into the intersection of emotional well-being and cybersecurity, it has become more evident than ever before that workplace culture profoundly impacts cyber risk. It is critical we all recognise industry-specific challenges in a…
A Quarter of UK Business Are Not Using AI to Bolster Cybersecurity
New research by Hornetsecurity highlights the AI cybersecurity gap affecting UK businesses. Although nearly half (45%) of companies have fallen victim to cyberattacks, 26% are still not using AI to enhance their cybersecurity defences. The survey, which gathered responses from…
Hack The Box redefines cybersecurity performance, setting new standards in the cyber readiness of organizations
Companies can level up their cybersecurity defenses – eliminating the skills and knowledge gaps that criminals regularly exploit thanks to Hack The Box’s Cyber Performance Center. Hack The Box’s Cyber Performance Center unites individual ability, business management practices, and the…
#MIWIC2024: Illyana Mullins, Founder of WiTCH (Women in Tech and Cyber Hub CIC)
Keeper Security Tightens Access Control with New Features
Today, Keeper Security have announced the introduction of Time-Limited Access and Self-Destructing Records, boosting secure access management for businesses. These features address the growing need for robust data protection in today’s fast-paced environment. Enhanced Security and Compliance Time-limited access and…
Synopsys Introduces Latest Solution for Comprehensive Security Across Software Supply Chains
Synopsys has introduced Black Duck® Supply Chain Edition, a novel software composition analysis (SCA) solution. This offering aids organisations in mitigating upstream risks within their software supply chains. Black Duck® Supply Chain Edition amalgamates various open source detection technologies, automated…