Passwords and secrets management organisation Keeper Security has earned the distinction of Value Leader in the latest Enterprise Management Associates (EMA) 2024 Privileged Access Management (PAM) Radar™ Report for the second year in a row. The report highlights KeeperPAM –…
Category: IT SECURITY GURU
Keeper Security Named a Value Leader in EMA’s 2024 PAM Radar™ Report
Passwords and secrets management organisation Keeper Security has earned the distinction of Value Leader in the latest Enterprise Management Associates (EMA) 2024 Privileged Access Management (PAM) Radar™ Report for the second year in a row. The report highlights KeeperPAM –…
Keeper Security Named a Value Leader in EMA’s 2024 PAM Radar™ Report
Passwords and secrets management organisation Keeper Security has earned the distinction of Value Leader in the latest Enterprise Management Associates (EMA) 2024 Privileged Access Management (PAM) Radar™ Report for the second year in a row. The report highlights KeeperPAM –…
Championing the Wins to Improve Wellbeing in the Cyber Workplace
It’s fair to say cyber security has a bad reputation. It’s portrayed as an industry full of stress, where sleepless nights are a prerequisite, and defenders have the weight of the world on their shoulders, while a world of adversaries…
UK Public Worried About Global Over Reliance on IT Systems
A new survey examining public sentiment towards global IT and software providers in the aftermath of the July 2024 CrowdStrike IT outages reveals over three-quarters of people in the UK now worry about the heavy reliance of global organisations on…
The GRC Group Strengthens Cybersecurity Offering with Acquisition of Pentest People, Expanding Its Global Reach and Expertise
The GRC Group (“GRC” or the “Group“), a leading provider of software and tech-enabled services to manage business risks and regulatory compliance, has today acquired Pentest People Ltd (“Pentest People”). The GRC Group is focused on building market-leading positions in…
Keeper Security Named a Value Leader in EMA’s 2024 PAM Radar™ Report
Passwords and secrets management organisation Keeper Security has earned the distinction of Value Leader in the latest Enterprise Management Associates (EMA) 2024 Privileged Access Management (PAM) Radar™ Report for the second year in a row. The report highlights KeeperPAM –…
September is Preparedness Month
For Preparedness Month in September, Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software, has urged businesses to prepare for the rising tide of cyber threats by prioritising fundamental cybersecurity practices. With more sensitive data being stored online, the…
Simone Biles & Cyber Burnout: A Shared Path to Resilience
This year’s Olympics and Paralympic games have been a showcase of the benefits of preparedness, tenacity, and adaptability in achieving success. Olympians require all of these traits, and more, to operate at the very top of their respective disciplines. However,…
Check Point Software Launches New MSSP Portal for Partners: Streamlining Service Delivery and Business Operations
Check Point® Software Technologies Ltd. today introduced its cutting-edge Portal tailored for managed security service providers (MSSPs) and distributors. This innovative platform streamlines service delivery and simplifies the business experience with Check Point. As highlighted by Canalys, the global MSSP…
The six most dangerous new threats security teams need to know about
The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks. As the technology evolves, many organisations prioritise AI innovation at…
INSIDER THREAT AWARENESS MONTH: Are you prepared?
An insider threat can feel a bit like the plot twist in a spy thriller. You know, the moment when the protagonist realises the enemy is not just at the gates but has been inside the house the whole time.…
Check Point Joins Esteemed Sponsors of Security Serious Unsung Heroes Awards 2024
It has been announced that Check Point Software has joined as a sponsor for this year’s Security Serious Unsung Heroes Awards. Check Point joins KnowBe4, Hornet Security, ThinkCyber, Pulse Conferences and The Zensory as key sponsors of this year’s event. The…
International Cyber Expo’s 2024 Tech Hub Stage Agenda Showcases the Future of Cybersecurity Innovation, From AI to Automation
Nineteen Group, organisers of International Cyber Expo, today proudly announce the programme for the 2024 Tech Hub Stage. The conference, set to take place at Olympia London on the 24-25 September 2024, will give visitors from around the world the…
Chemical Solutions Org Reduces the Time to Integrate Acquired Companies by 80% with Cato SASE Cloud Platform
SASE organisation Cato Networks has announced that Element Solutions Inc (ESI), the $2.3 billion provider of specialty chemical services, has adopted the Cato SASE Cloud Platform for its global network. With Cato, ESI onboards newly acquired companies quickly, in weeks…
How Immigration Can Solve America’s Cybersecurity Shortage
The U.S. is facing a critical shortage of cybersecurity professionals, a challenge that is not only growing but also poses a significant threat to national security. CyberSeek, a joint initiative of NIST’s NICE program, CompTIA, and Lightcast, reports in its…
Cybereason Unveils SDR Data Ramp Program: Analyse and Detect Threats in 1TB of Log Data for 90 Days
Cybereason has launched its revolutionary SDR Data Ramp Programme with Observe. This innovative initiative allows new customers of Cybereason’s Next Gen SIEM Detection & Response (SDR) product to send up to 1TB of log data per day free for the…
The 8 Most Common Website Design Mistakes According to Pros
We’ve all encountered websites that are legitimate, but feel clunky, slow, and frustrating to navigate. A website’s first impression directly impacts how users perceive a business’s quality and trustworthiness, making it crucial to get it right. However, creating an effective…
Dodging the Cyber Bullet: Early Signs of a Ransomware Attack
Ransomware attacks are a growing menace. Malicious actors are constantly honing their tactics to exploit vulnerabilities and extort ransoms from businesses and individuals. These attacks can cause significant financial and reputational damage, making it crucial for businesses to stay vigilant.…
Cyber insurance claims fall as businesses refuse ransom payments and recover themselves
Databarracks’ Data Health Check – an annual survey of 500 UK IT decision makers – found that while more organisations than ever have cyber insurance, the number of claims is down. 66% of those surveyed report having insurance specifically for…
AI-powered cyber threats are too overpowering for over 50% of security teams
According to research from Absolute Security, over half (54%) of Chief Information Security Officers (CISOs) feel their security team is unprepared for evolving AI-powered threats. The findings were uncovered in the Absolute Security United Kingdom CISO Cyber Resilience Report 2024,…
New Threat Report from Cato Networks Uncovers Threat Actor Selling Data and Source Code from Major Brands
This week, SASE pros, Cato Networks have published the Q2 2024 Cato CTRL SASE Threat Report, which provides insights into the threat landscape across several key areas: hacking communities and the dark web, enterprise security and network security. The report found that…
New Post Quantum Cryptography Standards Poised to Revolutionize Cybersecurity
The National Institute of Standards and Technology (NIST) has officially published its highly anticipated Federal Information Processing Standards (FIPS) for post-quantum cryptography (PQC). This significant development will affect a broad range of entities, including financial institutions and government agencies, particularly…
Kicking cyber security down the road can come back to bite you
The consequences of a successful cyber attack can be disastrous. From substantial financial loss to significant reputational damage, they can lead to untold operational disruption. Yet despite the clear and present danger, some businesses continue to deprioritise cyber security, with…
How to spot phishing in the age of AI
Since the rise of generative AI in late 2022, a lot has been written about the impact of these tools on cybersecurity. Over $1.1 billion was made in ransomware payments in 2023 alone – and the harsh reality is that…
What skills can cyber security experts develop to adapt to AI and quantum computing?
A career in cyber security is incredibly rewarding. Each day practitioners are met with new challenges that test their problem solving and critical thinking skills. It rewards creativity and can make a tangible impact on a business, its customers and…
NIS2 Directive in the EU: An imminent deadline, insufficient preparation
Dr. Martin J. Kraemer, Security Awareness Advocate at Knowbe4, gives his advice on where to organisations can start to act now with the impending NIS2 regulation While EU member states must introduce the Network and Information Systems Directive 2022…
European IT Professionals Want Training on AI, Poll Finds
New research conducted by ISACA found that 62% of people believe that AI will have a positive impact on audit/assurance in the next year – the highest number compared to other areas like risk, compliance, security, IT strategy/governance, and privacy.…
Expert Insight: Cyber Security Resilience Act: A game-changer for industry standards
For the IT Security Guru, Chris Dimitriadis, Chief Global Strategy Officer at ISACA, explores the UK Government’s proposed Cyber Security Resilience Act. As King Charles III read out the new Labour government’s plans at the State Opening of Parliament, our…
Women in CyberSecurity (WiCyS) Announces 5th Annual Security Training Scholarship
Women in CyberSecurity (WiCyS) have announced the 5th annual Security Training Scholarship (STS) Program in partnership with the SANS Institute. This initiative, made possible by WiCyS Tier 1 Partners and Premier Supporters such as Craig Newmark Philanthropies, the Center for…
Contrast Security Introduces ADR to Help Organisations Combat Zero Days and Secure Applications from Within
While many organisations can defend against published application vulnerabilities, they often neglect to build security into the application production process. This leaves the door wide open for vulnerabilities to be exploited by the adversaries. In fact, zero-day attacks are on…
Masterclass in CIAM for Insurance: Balancing Security, Experience, and Consent
The insurance industry is experiencing a significant transformation fuelled by the ubiquity of digital technologies. As these solutions gain traction in this sector, they add complexity to a regulatory landscape that insurance firms need to navigate, especially when it comes…
International Cyber Expo Announces Global Cyber Summit Theme: Resilience
Nineteen Group, organisers of International Cyber Expo, have announced the programme for the 2024 Global Cyber Summit, curated by the Security Awareness Special Interest Group (SASIG) and sponsored by Dataminr, Threatlocker, and e2e-Assure. The summit, set to take place at…
Salt Security Enhances API Platform with AI-Powered Insights
API security is becoming an increasingly more prominent discussion for security teams. Notably, API security incidents have more than doubled within the past 12 months, according to recent research. The research also found that API usage is rapidly accelerating, with…
KnowBe4 establishes 6th August as National Social Engineering Day to honour late Kevin Mitnick
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has announced today as the first established National Social Engineering Day, to be observed annually on August 6th. This new national day, officially recognised by the…
Bridging the skills gap to build a secure future for the cloud
Today, the cloud is ultimately the engine driving the future of many businesses. This exciting shift, however, faces a major hurdle: a lack of skilled professionals to navigate its complexities. This talent gap not only stalls innovation but also leaves…
Addressing communication roadblocks to overcome cybersecurity threats
It’s virtually impossible to imagine a sector where technology hasn’t led to improvements in productivity and profits but parallel to this, cyberattacks have also risen and become a part of working as a technology-reliant business. Cybersecurity incidents can have devastating…
6% of All Published CVEs Have Been Exploited in the Wild, Report Finds
Research from earlier this year revealed a worrying uptick in cyberattack volume in the past 24 months, with over a third (36%) of organisations admitting to experiencing three or more data breaches in this time frame. With attack volume increasing,…
HealthEquity Data Breach Compromises Customer Information
HealthEquity, a leading provider of health savings account (HSA) services, has announced it suffered a data breach recently, resulting in compromised customer protected health information (PHI). It is understood the breach was detected on March 25, 2024, after abnormal activity…
Accenture and SandboxAQ Expand Cybersecurity Partnership
Today, Accenture (NYSE: ACN) and SandboxAQ have announced that they are expanding their partnership to address the critical need for enterprise data encryption that can defend against current data breaches, as well as future AI and quantum threats. Together, Accenture…
People Overconfident in Password Habits, Overwhelmed by Too Many Passwords
New research by Keeper Security has revealed some worrying trends and misunderstandings when it comes to password best practices and overconfidence in cyber knowledge. The research found that, while 85% of respondents believe their passwords are secure, over half admit…
Secure, Simple, Superior: The Advantages of Tokenized Payment Cards by Wallester
Technology is advancing rapidly and tokenized payment cards are a part of its evolution. Gone are the days of keying in long card numbers, expiry dates and CVV codes and hoping for the best. Instead, tokenized cards offer heightened security…
Security Flaws Found in Hotjar, Potentially Affecting Sensitive Data of Millions Utilising Major Global Brands
New threat research by Salt-Labs, the research arm of API security company Salt Security, has released new research highlighting critical security flaws within popular web analytics provider Hotjar. The company serves over one million websites, including global brands like Microsoft…
Taking action: how to combat the financial repercussions of a cyber incident
Paying hackers not to release the data they have stolen from you is not the best way to manage the financial repercussions of a cyber-attack. Nor is trying hide the attack from the authorities…. Even the most vigilant companies can’t…
Effective change management practices in IT environments: a guide
Change is inevitable. IT environments are evolving, being updated and upgraded, modified and modernised, to keep pace with technological advancements and organisational needs. However, if these changes are not managed effectively, all the new technologies in the world will…
Cato Networks Surpasses $200 Million, Doubles ARR in Under Two Years
Today, SASE vendor, Cato Networks, announced it surpassed $200 million in annual recurring revenue (ARR) in the second quarter of 2024—doubling its total ARR in under two years. The news comes weeks after Cato was named a Leader in the…
DTX + UCX London is back: Global brands, cutting-edge technology and world-renowned speakers take centre stage
DTX London, the UK’s leading digital transformation event, has announced its doors will open on 2-3 October 2024, for what is set to be one of the most exciting technology exhibitions of the year. To maximise the experience, DTX will…
Security Serious Unsung Heroes Awards 2024 open for nominations
Eskenzi PR has opened nominations for its ninth annual Security Serious Unsung Heroes Awards. The awards are all about celebrating the UK’s cybersecurity professionals, teachers, lecturers, leaders, and those working to make the industry not only more secure, but also more diverse…
Over Half of UK Workers Haven’t Received Training on Avoiding Phishing Scams
Security Awareness pros KnowBe4 have published findings on cybersecurity training among UK employees and the adoption of ‘best practice’ policies by organisations. The report, entitled ‘UK Cybersecurity Practices at Work’, highlights the various cybersecurity threats faced by modern organisations and…
Mimecast Announces Acquisition of Code42, Expands Human Risk Management Platform with Visibility into Insider Threats
Mimecast, a leading global human risk management platform, announced today the acquisition of Code42, a leader in insider threat and data loss protection. Expanding on the success of their existing technology partnership, this acquisition marks a critical step in Mimecast’s…
CISOs and CIOs confront growing data protection challenges in the era of AI and cloud
Keepit, a global provider of a comprehensive cloud backup and recovery platform, today released a survey conducted by Foundry, as well as a study based on in-depth interviews conducted by Keepit. Both reveal critical gaps in disaster recovery strategies and…
Privilege escalation: unravelling a novel cyber-attack technique
Cyber criminals are notoriously relentless and unforgiving in their quest to exploit vulnerabilities through ever-evolving tactics. Organisations may believe that their security frameworks are robust, but when confronted with unprecedented attack methods, nobody is entirely immune to infiltration. Earlier this…
Enhancing the cybersecurity talent pool is key to securing our digital future
As the global digital industry continues to grow, there has been an increased demand for both businesses and Governments to prioritise cybersecurity. Cybercrime rates are quickly rising as according to Cybersecurity Ventures, damage costs are set to increase by 15%…
Worldwide IT Outages: Cybersecurity Experts Weigh In
Today (19th July 2024), outages have been reported across almost every facet of society, from airlines and airports, supermarkets and banking to communication services, NHS and trains. EDR org Crowdstrike said the problem was caused by “a defect found in…
Esteemed International Cyber Expo Advisory Council Expands
International Cyber Expo have announced the expansion of its world-class Advisory Council, now composed of 40 industry leaders from the fields of physical and cyber security. The Advisory Council, chaired by Ciaran Martin, Former CEO of the National Cyber Security…
Cyber Community Reacts: King’s Speech and AI Legislation
“My Government is committed to making work pay and will legislate to introduce a new deal for working people to ban exploitative practices and enhance employment rights. It will seek to establish the appropriate legislation to place requirements on those…
Digital Transformation EXPO (DTX) – Your Home of Digital Transformation
DTX brings together creative minds and technology practitioners with the tools needed to drive change, enhance experiences and improve efficiencies across today’s organisations. Covering cloud and infrastructure; software engineering and DevOps; data and AI; and cyber security, the event showcases…
First Annual OSC&R Report Reveals 95% of Organizations Have at Least One Severe Security Risk Within their Software Supply Chain
OX Security, the pioneer in Active Application Security Posture Management (Active ASPM), today issued the OSC&R community’s inaugural software supply chain threat report, “OSC&R in the Wild: A New Look at the Most Common Software Supply Chain Exposures.” Based on…
Global tech innovation initiative unlocks Singapore as key growth market for international startups
Plexal, the innovation company solving society’s challenges through collaboration, the Cyber Security Agency of Singapore (CSA) and National University of Singapore (NUS) have partnered for a new international initiative – CyberBoost. Extending across two streams initially, CyberBoost: Build will support…
Authy breach exposes data of millions – what to look out for if you use it
The exposure of millions of users’ phone numbers in the recent breach of Twilio’s 2FA app, Authy, has serious implications for users, who are now at a significantly heightened risk of phishing attacks and SIM swapping, endangering their privacy and…
Report reveals that three quarters of UK businesses have been impacted by AI-powered cyber threats
Darktrace, a global leader in cybersecurity AI, has today released its UK State of AI Cybersecurity Report, which surveyed over 200 security leaders and practitioners across a broad array of industries. The research asked security leaders their thoughts on the…
Cyber Confidence at MSPs high, despite falling victim to data breaches
New research conducted by CyberSmart, a leading provider of SME security solutions indicates that nearly all MSPS report high rates of cyber confidence across their organisations, despite the vast majority having experienced at least one data breach in the past…
RockYou2024: 10 BILLION unique passwords exposed – what now?
The “RockYou2024” data leak has exposed nearly 10 billion unique plaintext passwords. This breach, discovered by researchers and shared on a popular hacking forum, represents a dramatic increase in the threat of credential-stuffing attacks. The dataset, posted by a user…
Cato Networks Named a Leader in the 2024 Gartner Magic Quadrant for Single-Vendor SASE
Cato Networks, the SASE leader, today announced that Gartner, Inc. has recognised the company as a Leader in the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE. “Cato’s true SASE platform is the antidote to IT complexity that persists in the…
SQR Wins Isle of Man Government Contract
SQR, a leading provider of digital identity solutions, has won a major contract with the Isle of Man Government. The fast-growing Isle of Man based firm has been selected in partnership with software development and digital transformation experts, PDMS, to…
Keeper Security Launches Zero-Knowledge Remote Browser Isolation in Keeper Connection Manager
Keeper Security has introduced Remote Browser Isolation, a new component of Keeper Connection Manager. Remote Browser Isolation provides users with secure access to web-based assets such as internal web applications and cloud applications – using any standard web browser. Remote…
IT Security Responsibilities for Online Start-Ups
In this digital world we live in, online start-ups are emerging rapidly, harnessing the power of the internet to reach global audiences and deliver innovative solutions. However, with the increased digital presence comes an elevated risk of cyber threats. For…
UK law firms feeling pressure to prioritise business continuity over cybersecurity
The never-ending fragmentation of IT, driven by the rapid and constant evolution of Legal Tech, is causing huge cyber defence issues for UK legal firms, according to a new report from Managed Threat Detection & Response Provider, e2e-assure. The complexity…
Protecting our data in a world of rising cyber attacks
In today’s volatile digital climate, the security of workers’ and customers’ data and information, as well as the finances and intellectual property of organizations themselves, continues to be questioned. Data sits at the very heart of the world’s largest companies,…
Blurred lines: Securing the physical and digital sides of business
Understanding cybersecurity can be challenging. Although cyber threats such as data theft and financial fraud represent serious business concerns, physical threats often evoke more fear due to their tangible nature. With the boundaries between physical and digital security becoming increasingly…
Fear and Silence: 50% of Employees Hesitant to Report Security Errors
Despite the growing implementation of security awareness training, recent research indicates that over half of cybersecurity professionals are concerned about security behaviours within their organisations. Key Findings from the Survey A survey conducted by ThinkCyber has revealed significant insights into…
One in ten Brits targeted by scammers this summer
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has released findings on the increased rate of scams targeting people this summer in the UK. It warns people looking to travel abroad or attend music…
SandboxAQ Joins the FIDO Alliance to Further Drive the Use of Secure Protocols instead of Passwords
SandboxAQ has announced its membership in the FIDO Alliance, an open industry consortium focused on minimizing the world’s dependence on passwords—a prevalent source of security and usability problems. By joining forces with prominent FIDO Alliance members such as Amazon, Apple,…
Review: Top 5 For Outsourced Customer Service Solutions UK and Abroad
For companies that have too many phone calls and emails to keep up, it is very common to outsource your customer services, either domestically in the UK or abroad to the likes of India or The Philippines. There are certainly…
Third of Organisations Have Suffered Three or More Data Breaches in the Last 24 Months
New research by Advanced Cyber Defence Systems (ACDS) has found that half of IT professionals believe there are devices connected to their network that they’re unaware of – despite nearly 60% admitting that insecure devices pose a ‘very high’ or…
Former Global CISO of Wells Fargo, Sunil Seshadri, Joins Board of Directors at Obsidian Security
This week, Obsidian Security, announces the appointment of Sunil Seshadri to its Board of Directors. Sunil joins the board at a time when the Obsidian platform has become essential to Incident Response providers around the world as they respond to…
KnowBe4 Launches Ransomware Awareness Month With IT Resource Kit at No Cost
With July being Ransomware awareness month, KnowBe4 has released a ransomware resource toolkit at no cost for organisations and IT managers as part of a dedicated, month-long campaign in July to increase awareness about ransomware attacks. Ransomware is a malicious…
How AI Tool Marketplaces Are Revolutionising Business Efficiency
In today’s fast-paced digital world, businesses constantly seek ways to enhance efficiency, streamline operations, and stay ahead of the competition. One of the most transformative developments in recent years has been the rise of AI tool marketplaces. These platforms offer…
New Cato Networks MSASE Framework Gives Vendor-Like Powers to Channel Partners
Since Gartner officially defined Secure Access Service Edge (SASE) in 2019, many organisations have eagerly embraced this next-generation solution. SASE allows organisations to elevate existing problems, with simplicity, reliability, flexibility and automation. As many organisations turn to the cloud to…
New body IMCSO to elevate standards and streamline provisioning of cybersecurity services in Maritime
The maritime industry is vitally important to the global supply chain for multiple reasons, from food, medicine and consumer goods to fuel and other important products. But with any key industry, comes an opportunity for criminals to exploit and disrupt…
Community Corner: CybAid
Community is exceptionally important to the team at the IT Security Guru. We believe that building community and supporting one another is where our industry thrives, that’s why we’re platforming charities and networks that work within the industry, as well…
Telcos Hit Hardest by Cloud Malware, Report Finds
Telecom companies are being targeted by malicious actors at an alarming rate, according to a new report by Netskope Threat Labs. The report highlights a concerning trend of attackers exploiting popular cloud apps like Microsoft OneDrive and GitHub to deliver…
Obsidian Security Partners with Databricks to Bolster SaaS Data Governance
Obsidian Security, the pioneer of SaaS security, announced today a strategic partnership with Databricks, the Data and AI company. This alliance strengthens the security of applications built on the Databricks Data Intelligence Platform and helps customers enact their data security and…
AI Receptionists For GPs Launched By Customer Service Firm InTouchNow
AI receptionists for GPs and medical practices are now being operated throughout the country, thanks to the help of customer service centre, InTouchNow. The Hertfordshire-based company has been trading for 30 years and has developed its own technology and softwares…
Salt Security Survey Reveals 95% of Respondents Experienced API Security Problems in Past Year
API security professionals at Salt Security have revealed the findings of their latest Salt Labs State of API Security Report, 2024. The research, which analysed survey responses from 250 IT and security professionals, combined with anonymised empirical data from Salt…
Defending your ever-changing attack surface
The very elements crucial for a business’s functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas,…
Why ransomware is still important to business resilience
Ransomware may be an old technique, however, due to increasing levels of digital connectivity, are witnessing a proliferation of ransomware attacks in recent years, which pose significant threats to individuals, businesses, and entire industry sectors industries. Ransomware, in its current…
Outpost24 Launches Exposure Management Platform To Help Organizations Reduce Attack Surface Risk
Outpost24 has launched its Outpost24 Exposure Management Platform, a new integrated exposure management solution designed to empower organizations to continuously monitor and proactively remediate threats against the growing attack surface. As a result of digital transformation, increased adoption of SaaS…
Survey Finds Growing Number of Tech Tools Makes Cybersecurity Professionals Feel “Out of Control”
New research reveals that nearly half of security professionals (48%) say they favour standalone security solutions for specific issues. The new research by Keeper Security also revealed that cybersecurity professionals, on average, have been left grappling with 32 different security solutions…
Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns
A new threat actor group known as Gitloker has launched an alarming campaign that wipes victims’ GitHub repositories and attempts to extort them. Victims are finding their repositories erased, replaced only by a solitary README file bearing the message: “I…
Men’s Mental Health Week: Resource Guide
10th – 16th June 2024 is International Men’s Mental Health Week. It may feel like there are too many ‘awareness dates’, however this week is especially important. Men are far less likely to talk about mental health than women (it…
Finance Phantom Review – A Crypto Trading Robot that Can Be Your Guardian Too
Entering the world of crypto trading is easy, but if you have plans to stay there on a long-term basis then you have to acknowledge all the ups and downs of it. This constant fluctuation won’t stop but what you…
Is Your Business Under Attack From AI?
Artificial Intelligence (AI) is highly innovative but also poses significant risks to all organisations, as shown by the recent high profile hacks at Ticketmaster, Santander and the NHS. This article will delve into how AI can be manipulated by cyber…
The role of unstructured data and Large Language Models in securing data
Advancements in Artificial Intelligence (AI) and Machine Learning (ML) have lowered the barrier of entry for non-security users to independently develop and manage their own data products, which when decentralised to enable separate cross domain data analysis is known as…
Strategies to Manage and Reduce Alert Fatigue in SOCs
The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two…
9 out of 10 businesses seek AI-led threat detection and vulnerability management
OpenText today released the findings of its annual OpenText Cybersecurity Global Managed Security Survey. The 2024 survey of over 1,500 Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) found that the majority (92.5%) see increasing AI-led security and…
Elevating threat detection and response to a new level
Cybersecurity platforms have emerged as indispensable assets for threat detection, response and management. They proactively keep tabs on network traffic, user behaviour and system activities to identify and mitigate risks before they escalate into potentially catastrophic breaches. Yet, the efficacy…
#MIWIC2024 One To Watch: Jasmine Eskenzi, Founder and CEO of The Zensory
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Ones to Watch winners…
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2024
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Tapa Tapa, London, on the 5th June 2024. The awards celebrated the industry’s best blogs, podcasts, and vlogs, as well as the exceptional talent who…
5 Tips for Improving Your Business Security
When it comes to data security, you might think of firewalls, encryption, or vulnerability scanning. However, many businesses overlook the role of physical security in safeguarding their card data. However, there are numerous methods for data thieves to gain access…