New research by Netskope Threat Labs has revealed that infostealers were the primary malware and ransowmare families used to target the healthcare sector. Healthcare was among the top sectors impacted during 2023 by mega breaches, an attack where over one…
Tag: IT SECURITY GURU
ChatGPT Extensions Could be Exploited to Steal Data and Sensitive Information
API security professionals Salt Security have released new threat research from Salt Labs highlighting critical security flaws within ChatGPT plugins, presenting a new risk for enterprises. Plugins provide AI chatbots like ChatGPT access and permissions to perform tasks on behalf…
Expert Insight: How more diverse perspectives can lead to more innovative solutions
For some time now, there has been a worrying lack of the requisite skills around cloud security, data security, and application security. Especially within the mid and senior level. Part of the reason is that cloud architectures and the ever…
New Mimecast report finds cybercriminals capitalise on businesses’ biggest flaw: Human risk
Mimecast, a global cybersecurity company, today announced the publication of its “The State of Email and Collaboration Security 2024” (SOECS) report. According to the research, cyber threats are growing at an unprecedented pace, and the year ahead is fraught with…
i-confidential Receives EcoVadis Gold Sustainability Rating
i-confidential, a leader in cyber security consultancy services and a specialist provider of security resourcing, has announced it has achieved a Gold Sustainability rating from EcoVadis, one of the world’s leading providers of business sustainability accreditations. i-confidential notes that business…
#MIWIC2024: Lauren Zink, Manager of Security, Culture and Awareness at Indeed
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
ISACA Joins Forces with Erasmus+ for SHE@CYBER Project
ISACA has announced its participation in the Erasmus+ program’s SHE@CYBER project. This initiative, under the EC Cooperation partnerships in vocational education and training, is a concerted effort to address the cybersecurity skills gap in Europe, with a particular focus on…
#MIWIC2024: Blessing Usoro, Cyber for Schoolgirls
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected…
#MIWIC2024: Rosie Anderson, Th4ts3cur1ty.Company
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top…
What We Learned from These 3 API Security Breaches
They say, “Experience is the best teacher.” Well, they never said it had to be your experience. If we look closely, there are lessons to be learned from these five fateful API attacks that can help any organisation secure its…
Championing Diversity in Data Protection
By Jasmine Harrison PC.dp, Account Manager – Data Protection People Women play an important role in the field of data protection, bringing diverse perspectives and ethical considerations into an area that can be a minefield for many. This often leads…
International Women’s Day 2024: Inspiring inclusion for the next generation
International Women’s Day has long been an advocate for elevating and advancing gender equality within the technology industry. At the heart of this celebration is a collective commitment to recognise and celebrate the women who are not only making significant…
5 Reasons to Leverage MDR to Transform Your SecOps
Cybersecurity threats are evolving at an unprecedented pace, posing significant challenges to Security Operations (SecOps) teams worldwide. Managed Detection and Response (MDR) emerges as a crucial ally, offering a sophisticated blend of technology and expertise to fortify defenses. Read on…
Boston Red Sox Choose Centripetal as Cyber Network Security Partner
Threat intelligence pros, Centripetal have announced that it has been selected as the Official Cyber Network Security Partner for the Boston Red Sox and Fenway Park. Under the multi-year partnership, Centripetal will protect the Boston Red Sox by deploying its…
Chinese nation state actors to ramp up cyber espionage attempts in 2024
CYJAX, a threat intelligence provider, today announces its latest research, Broken China, analysing the turbulent socio-economic situation in China and how this will likely lead to an increase in cyber espionage activities by the PRC to give Chinese businesses a…
90% of Leaders Plan to Integrate AI into their Organisations in 2024
New research by Logicalis has revealed that AI, digital transformation and cybersecurity are the top priorities for tech leaders. The research was revealed in the company’s 10th annual CIO report, which surveyed over 1,000 CIOs globally. Despite economic uncertainty, 85%…
Exceptional Women Recognised for Contribution to Cyber Industry at Most Inspiring Women in Cyber Awards 2024
The 20 winners of the Most Inspiring Women in Cyber Awards were announced at a ceremony held at the prestigious BT Tower in London on the 27th February 2024. The awards celebrated the achievements of women working in cybersecurity around…
Advanced Cyber Defence Systems (ADCS) to Showcase Innovative Attack Surface Management Solution at Cloud & Cyber Security Expo
Continuing on from their popular webinar series, Advanced Cyber Defence Systems (ACDS) are taking their ‘Think Like a Hacker’ series to The Cloud & Cyber Expo. At the event, the team will be demoing their cutting-edge Attack Surface Management solution.…
Keeper Security Joins the AWS Partner Network
Providers of cloud-based zero-trust and zero-knowledge cybersecurity, Keeper Security have announced that it has joined the Amazon Web Services (AWS) Partner Network (APN). The APN is a global community of AWS Partners that leverage programmes, expertise and resources to build,…
Cato Networks Announces 59% Revenue Growth In 2023 Business Results
Cato Networks, the leader in SASE, today announced strong 2023 business results including 59% revenue growth, the addition of more than 700 new enterprise customers, ongoing channel expansion, and continued innovation across Cato’s pioneering SASE platform. “Nine years ago, we…
Synopsys Report: 74% of Codebases Harbour High-Risk Open Source Vulnerabilities, Up 54%
Synopsys has unveiled the ninth edition of its annual “Open Source Security and Risk Analysis” (OSSRA) report, indicating a significant surge in high-risk vulnerabilities affecting nearly three-quarters of commercial codebases compared to the previous year. In this 2024 OSSRA report,…
Cato Networks to Present on AI and SASE at Cloud Expo Europe and DevOps Live
Cato Networks, provider of the world’s leading single-vendor SASE platform, today announces that Senior Director of Security Strategy, Etay Maor, and Director of Product Marketing, Greg Duffy, will be speaking at the upcoming Tech Show London, within its Cloud Expo Europe…
Cyber Mindfulness Corner Company Spotlight: Jamf
At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Aaron Webb, Senior Product Marketing Manager at Jamf, spoke to the Gurus about how leaders can approach the burnout crisis…
MIWIC24: Plexal Alumni Receive Multiple Nominations From Peers at This Year’s Awards
Plexal work with some of the UK’s most exciting start-ups, entrepreneurs and scale-ups who are building emerging technologies and operating across multiple sectors. Plexal help build community, foster talent, and launch graduating companies and professionals into success. They work in…
New Cybereason ‘True Cost to Business Study 2024’ Reveals it Still Doesn’t Pay to Pay
Cybereason has today announced the results of their third annual ransomware study, commissioned to better understand the true impact of ransomware to businesses. This global study reveals ransomware attacks are becoming more frequent, effective, and sophisticated: 56 percent of organisations…
Adarma Collaborates with Scottish Enterprise to Unveil Neurodiversity Strategy
Adarma has today announced its neurodiversity strategy in partnership with Scottish Enterprise, Scotland’s national economic development agency. The strategy supports Adarma’s continued commitment to attract, support, and empower people from diverse backgrounds into the cybersecurity sector, which will help combat…
ISC2 Collaborates with IBM to Launch Entry-Level Cybersecurity Certificate
ISC2 – the world’s leading nonprofit member organization for cybersecurity professionals – announced a partnership with IBM (NYSE: IBM) to launch the IBM and ISC2 Cybersecurity Specialist Professional Certificate. The new entry-level program, available exclusively via the Coursera platform, is designed to prepare…
Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 3
The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so…
Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 2
The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so…
Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 1
The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so…
The Cyber Scheme launches training course for IoT/ICS security testers
The Cyber Scheme has announced availability of a new CSII Practitioner Training Course that has been developed as a comprehensive IoT/ICS hacking course. The aim of the course is to teach candidates all the skills they need to securely test…
“Dr. Zero Trust” Chase Cunningham Joins Keeper Security Public Sector Advisory Board
Today, Keeper Security have announced the appointment of Dr. Chase Cunningham to its Public Sector Advisory Board. Cunningham’s appointment reflects Keeper Security’s commitment to zero-trust security. Keeper’s early adoption of zero-trust architecture has become a model for national security and…
Cyber gaps in the supply chain — Bank of America breached in another vendor cyberattack
Third-party cyber-attacks remain one of the most significant threats facing organisations across the globe. Most recently, Bank of America, a multinational investment banking and financial services corporation, began notifying customers that a November 2023 hack against one of its service…
The Channel can help SMEs protect themselves from increasing security threats
Recent reports indicate that SME resellers specialising in security are optimistic about the future, expecting a better year ahead than the challenges they faced in the previous 12 months. With increasing cyber threats and the need for secure and reliable…
Own Company Unveils New Channel Partner Program
Own Company, a leading SaaS data platform, today announced the launch of a global Channel Partner Program aimed at empowering resellers and system integrators to proactively prevent their customers from losing mission-critical data and metadata. With automated backups and rapid,…
Quantum computing: The data security conundrum
One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven…
Verizon Breach – Malicious Insider or Innocuous Click?
A household name among American media companies, Verizon Communications on Wednesday began notifying employees that an insider may have gained access to their data. According to the breach notice to the Maine Attorney General, an unauthorized employee opened a file…
Keeper Security Available on Apple Vision Pro
Password manager Keeper Security announced this week that users can log in to applications on the new Apple Vision Pro™ with Keeper, providing secure and seamless access to content on the revolutionary new device. As spatial computing becomes a reality…
Centripetal and Platform 94 Join Forces to Bring Cybersecurity Defence to Irish Companies
Almost one in five Irish firms experienced a significant cyber attack or data breach in 2022, according to research by Aon. It’s no wonder that Irish businesses are concerned about cybersecurity, with ever evolving threats and new and novel attack…
Safer Internet Day: Cybersecurity Experts Weigh In
Happy Safer Internet Day to all those who celebrate! Cybersecurity experts from across the industry have weighed in on how we can use the internet in a safer way, both professionally and personally, in an age of increasing attacks and…
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages, SenseOn research reveals
The majority of large enterprises spend an average of 3-5 months integrating and training teams on each new security solution – at the expense of threat hunting, vulnerability scanning and security awareness training However, major contradictions are rife, with 76%…
ThinkCyber and Plexal Join BT as Sponsors of The Most Inspiring Women in Cyber Awards 2024
Eskenzi PR are proud to announce that ThinkCyber, the innovators of measurable secure behaviour change with their Redflags® software, and Plexal, the innovation company solving society’s challenges through collaboration with government, start-ups and industry, have joined BT as sponsors for…
A Comprehensive Overview Of Nanotechnology And Applications Of Nanotechnology
What Is Nanotechnology? Nanotechnology is concerned with nano-scale materials and structures. Nano-scale refers to particles and devices that are less than 100 microns in size. A sheet of paper has a thickness of 100,000 nano-meters, while a person who stands…
What is HTTP Request Smuggling and HTTP/2 Downgrading?
Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result…
Salt Security Joins AWS Lambda Ready Program
Today, API security company Salt Security has announced that it has been accepted to the Amazon Web Services (AWS) Lambda Ready Program. Salt now supports and simplifies deployments to AWS Lambda, allowing customers to capture API traffic flowing through serverless environments…
AI-Powered Attacks and Deepfake Technology Fuel Cyberattack Concern
Today, password security pros, Keeper Security have released the key findings from its latest survey about the state of cybersecurity and the burgeoning threats that are keeping cyber professionals up at night. The survey of more than 800 IT security…
Introducing meaningful AI features for information security in 2024
Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. He explains why his company is focused on developing AI tools that deliver benefits over media buzz. There’s been a…
Ransomware Research Reveals Millions Spent Despite Do Not Pay Policies
Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals the majority of companies are paying ransoms and breaking their ‘do not pay’ policies. The research polled from over 900 IT and Security decision-makers, 301 from the…
SAS joins fight against cybercrime as NCRCG National Ambassador
This week, the National Cyber Resilience Centre Group (NCRCG) – a strategic collaboration between the Home Office, policing, academic and National Ambassador partners – has welcomed AI and analytics leader, SAS, on board as a National Ambassador. In taking up…
Navigating the Landscape of Advanced Email Security Threats with Optimism
In the contemporary digital era, email remains one of the most predominant forms of business communication. With its unrivalled efficiency and ubiquity, email bridges gaps between organisations and their global workforce, facilitating seamless collaboration. However, this prevalence has also placed…
Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment
For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure them have existed. Manufacturing, agriculture, critical national infrastructure, and healthcare to name but a few,…
Previous Most Inspiring Women in Cyber Winners: Where Are They Now?
Over the last four years, The Most Inspiring Women in Cyber Awards have celebrated some of most inspirational women from across the cybersecurity industry. From CISOs to students, the awards aim to celebrate everyone, no matter what stage of their…
Data Privacy Day: Privacy budgets expected to decrease in 2024
According to new research from ISACA, two in every five (41%) privacy professionals in Europe state their budgets are underfunded and over half (56%) expect them to decrease this year. Anticipated drops in privacy budgets come despite half (53%) of organisations…
Data Privacy Day: Privacy budgets expected to decrease in 2024, new research from ISACA reveals
According to new research from ISACA, two in every five (41%) privacy professionals in Europe state their budgets are underfunded and over half (56%) expect them to decrease this year. Anticipated drops in privacy budgets come despite half (53%) of organisations…
Data Privacy Day 2024: Part 1
With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Allon Mureinik, senior manager, software engineering at the Synopsys Software Integrity Group: “In today’s world of social media and open-source development, sharing…
Data Privacy Day 2024: Part 2
With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Alex Hazell, Head of Legal and Privacy for Acxiom EMEA, says: “In 2024, we can no longer discuss data privacy without talking…
Nineteen Group acquires SASIG
Today, the award-winning Nineteen Group, who runs a number of industry events and exhibitions such as the International Cyber Expo, has announced that it has acquired The Security Awareness Special Interest Group (SASIG), a networking and thought leadership forum for…
The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos
While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch out for in the cybersecurity space. Experian’s 11th annual Data Breach Industry Forecast includes six predictions for 2024 that focuses a global lens…
‘Mother of all breaches’ uncovered after 26 billion records leaked
Yesterday, the security team at Cybernews announced what will likely prove to be the largest data breach of all time. In joint effort with security researcher Bob Dyachenko, the Cybernews team found an open instance on the web containing billions…
Cato Networks Introduces World’s First SASE-based XDR
Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world’s first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato…
Public Sector Cyberattacks Rise By 40% in 2023
Cyber attacks against government agencies and public sector services increased by 40% in the second quarter of 2023 compared to the first, a new report by KnowBe4 has highlighted. The Cybercrime in the Public Sector report examines the most popular…
Keeper Security Announces Partnership with St. Anna Children’s Cancer Research Institute
Today, password pros Keeper Security have announced a partnership with St. Anna Children’s Cancer Research Institute (St. Anna CCRI), a renowned Austrian healthcare institution based in Vienna. St. Anna CCRI is a renowned paediatric cancer research institute. Keeper will provide…
Top Unexpected Ways to Utilise a Password Manager for Enhanced Security and Organisation
Password managers have become integral tools for individuals and businesses alike. They are primarily known for securely saving and managing login credentials so users don’t have to remember them all or write them down, where they could be compromised. However,…
71 Million Emails Added to Have I Been Pwned From Naz.API Stolen Account List
Almost 71 million email addresses linked to compromised accounts from the Naz.API dataset have been incorporated into the data breach notification service of Have I Been Pwned. The Naz.API dataset, consisting of 1 billion credentials, is an extensive compilation derived…
Keeper Security Adds Support for Hardware Security Keys as Sole 2FA Method
Zero-trust and zero-knowledge pros, Keeper Security, have introduced support for hardware security keys as a single Two-Factor Authentication (2FA) method. Implementing user authentication with only a hardware security key enhances overall security by providing a robust physical second factor, mitigating…
New research reveals disconnect between global university education and recruitment standards
New research conducted in the UK and US reveals that over three-quarters (78%) of cybersecurity and IT professionals believe a traditional university education in cybersecurity is not doing enough to prepare graduates for the modern workforce. Meanwhile, nearly two-thirds (64%)…
Salt Security Delivers another Technology Breakthrough with Industry’s only API Posture Governance Engine
Today, API security company Salt Security has announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt Security API Protection Platform. Salt leapfrogs traditional posture management by providing the industry’s first API posture governance…
Nominations Open for The Most Inspiring Women in Cyber Awards 2024
The nominations for the 4th annual Most Inspiring Women in Cyber Awards, sponsored by BT and hosted by Eskenzi PR, have opened. The event, to be held on the 27th February 2024 at the BT Tower in London, will honour…
Closed Door Security Becomes Scotland’s First Chartered Cyber Security Business
Closed Door Security, a leading provider of attack-driven cyber security assessments, today announced its CEO and founder, William Wright, has just been awarded with a Chartership in Cyber Security, turning the company into Scotland’s most highly accredited cyber security firm.…
Bitcoin ETFs Approved Following Official SEC X Account Compromise
For many years, the cryptocurrency industry has waited with bated breath for the U.S. Securities and Exchange Commission (SEC) to finally approve Bitcoin ETFs. Finally, on Wednesday the SEC granted this wish, announcing the approval for “a number of spot…
Critical Security Vulnerabilities Identified in ConnectWise ScreenConnect by Gotham Security Researchers
Gotham Security, an Abacus Group company providing high-quality boutique cybersecurity services, has announced that its research team recently discovered two vulnerabilities in ConnectWise ScreenConnect, saving tens of thousands of enterprises from the possible consequences of a significant cyber-attack. ConnectWise ScreenConnect…
Keeper Security Unveils Granular Sharing Enforcements for Easier Compliance
Today. Keeper Security has announced Granular Sharing Enforcements for all products in the Keeper® platform. Granular Sharing enables administrators to enforce detailed creating and sharing permissions at the user level. By implementing these permissions, organisations can ensure employees only have access…
Cato Networks Names Cybersecurity Veteran to Lead Northern Europe and Middle East & Africa
Cato Networks, the leader in SASE, announced that Kanwar Loyal has been named Vice President for the SASE leader’s Northern Europe and Middle East & Africa (MEA) regions. Loyal joins Cato from CrowdStrike, where he spent the past six years in…
23andMe shifts blame to users for data breach
The DNA testing company 23andMe has had a rough few months – first reported in October that data had been breached – and now, the response to those breaches due to customers taking legal action against the company. In an…
Q&A: Supporting SOC Teams and Avoiding Burnout
We know that burnout is a problem for many people across the cybersecurity industry. We also know that in order to be the most secure we can be, we have to support those who secure us, whether that’s through burnout…
The best iOS fax app to protect your privacy
Mobile faxing is experiencing a significant surge in popularity, driven by both businesses and individuals seeking paperless alternatives. Unsurprisingly, many are now opting for mobile fax apps. If you’re an iPhone user on the lookout for a mobile fax app,…
VPN to protect against DDoS attacks on Twitch
Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it…
Ho Ho Home For Christmas? Tips For Avoiding Tech Terrors This Festive Season
With Christmas fast approaching, many of us will be hoping to find some new tech under the tree. From innovative gadgets that spark creativity to interactive devices that bring families together, tech toys can add an extra layer of excitement…
2024 Cybersecurity Industry Experts Predictions: Part 1
As 2023 draws to a close, it’s time for cybersecurity experts to gaze into their crystal balls and predict what the next year has set in store for the security industry. In the first part of our predictions round-up experts…
Cyberelements Launches Dedicated MSP Program
Today, Zero Trust Privileged Access Management (PAM) platform cyberelements have launched their Managed Security Provider (MSP) Program enabling partners to increase revenues and deliver a pioneering Zero PAM platform that is set to transform how organisations secure access for standard…
Most API security strategies are underdeveloped. Let’s unpack that.
For attackers, Sun Tzu’s “The Art of War” has guidance on war strategy. For starters, “All warfare is based on deception. Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we…
Why a Master’s in Cyber Security is Your Ticket to a Thriving Career
Have you ever wondered who keeps our online world safe from all the bad guys? The heroes who do this have a special kind of training – they have a Master’s degree in something called Cyber Security. It’s like being…
Expanding Reach and Reducing Costs: Cato Enhances Capabilities with Latest Third-Party Integrations
According to Gartner’s projections, by the close of 2024, more than 40% of enterprises are expected to have well-defined strategies for Secure Access Service Edge (SASE) adoption. This is a substantial leap from the mere 1% reported in 2018. Cato,…
Netskope and BT Partner to Provide Secure Managed Services to the Modern Hybrid Enterprise
Today, BT and Netskope have announced a partnership to bring Netskope’s Security Service Edge (SSE) capabilities to BT’s global customers. The partnership follows a number of large customer implementations where the two companies have already collaborated to successfully meet the…
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications
Email is the most common attack vector for cybercriminals, in fact the overwhelming majority (94%) of malware-related security incidents are delivered via email. It’s no surprise that email security is at the forefront of many business leader’s minds. In any case,…
New Synopsys Report Reveals Application Security Automation Soars
Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services,…
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud
A new report by zero-trust and zero-knowledge cybersecurity software providers Keeper Security has found that over 80% of IT leaders (82%) want to move their on-premises Privilege Access Management (PAM) solution to the Cloud. The findings were outlined in a…
Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market
Today, intelligence powered cybersecurity pros Centripetal have announced that their patented cybersecurity threat solution is available for the first time ever across the UK as a result of its strategic partnership with Tiger. Centripetal’s innovative technology is currently deployed by…
Google bins inactive accounts
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re…
40% of Cybersecurity Departments Want More Budget to Upskill Employees
According to a new Cyber Security Insights Report by S-RM, in 2023, the average cyber budgets grew to USD 27.10 million, up 3.1% from USD 26.30 million in 2022. S-RM’s research shows that senior IT professionals and their c-suites had…
AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement
Jeremy Hunt, the Chancellor of the Exchequer for the UK, delivered his Autumn Statement of 2023 on November the 22nd to Parliament. In this statement, he outlined the government’s five economic priorities for the upcoming forecast period. These include reducing…
Half of Cybersecurity Professionals Kept Awake By Workload Worries
According to research by the Chartered Institute of Information Security (CIISec), cybersecurity professionals report that the industry is “booming”, but 22% of staff report to work unsafe hours. This research, revealed in the Security Profession Survey 2022-2023, gives an insight…
Cyber Mindfulness Corner Company Spotlight: Pentest People
At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week, Gemma Gilderdale, Head of People at Pentest People, spoke to the Gurus about Pentest People’s innovative wellbeing support, the future…
Equal Pay Day: Women, Cybersecurity, and Money
Let’s talk about women – and money. Today (22nd November 2023) marks the day that women effectively stop being paid for the year. Stop being paid against their male counterparts for the same work that they do – for the…
Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows
Employee violations of an organisation’s information security policies are as dangerous as external hacker attacks according to a recent study from Kaspersky. In the last two years, 26% of cyber incidents in businesses occurred due to employees intentionally violating security…
Over Half of Organisations Are at Risk of Cyberattack Due to Exhausted and Stressed Staff
Today, new research from Adarma has revealed that organisations believe that they are at significant risk of cyberattacks due to stressed and exhausted staff. The report, entitled “A False Sense of Cybersecurity: How Feeling Safe Can Sabotage Your Business,” highlights…
Cato Networks Named SASE Leader, Again
Today, Cato Networks, announced its recognition as a Leader in both the Frost Radar™: Global SASE, 2023 by Frost & Sullivan and the Market Radar: SASE 2023 by Omdia. “Once again, Cato Networks and our cloud-native SASE platform have been…
Lookout Alerts U.S. Employees and Businesses of Significant Phishing Threat This Week
This week, Lookout, Inc., is warning employees and businesses that phishing attacks across enterprise and personal devices are expected to more than double this week, based on historical data. With more corporate data residing in the cloud today and an…
LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry
New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…
Recognising Scam Patterns and Preventing Data Loss: A Unified Approach
Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…