Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

Securing Docker with CIS Controls

Containers, along with orchestrators such as Kubernetes, have ushered in a new era of application development methodology, enabling microservices architectures as well as continuous development and delivery. Docker is by far the most dominant container runtime engine, with a 91% penetration according to the State of the Container and Kubernetes Security Report. Containerization has many benefits and as a result has seen wide adoption. Gartner predicts that by 2023, 70% of organizations will be running...

Read more
Verizon Logo

Verizon published today its yearly Data Breach Investigation Report, based on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. The report provides a most useful snapshot of the current state of the fight against cybercrime, and highlights not only the weaknesses in organisations' approach to security, but also the areas where cybercriminals seem to be focussing their efforts. IT...

Read more
mental health

by Corin Imai, senior security advisor at DomainTools Cybercrime and mental health issues are both rampant. This article will look at how mental health issues can leave organisations more at risk to cybercrime, and how combatting cybercrime can affect mental health.  Professional burnout is defined as a work-related condition of stress causing exhaustion, a sense of reduced accomplishment and loss of personal identity. Extensive literature exists about this phenomenon in relations to healthcare professionals, who need...

Read more
Computer with encryption

From: Thomas, Kevin Sent: 24 August 2019 10:43 To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, Javvad Sent: 24 August 2019 11:03 To: Thomas, Kevin Subject: Encryption Hi Kevin, Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those...

Read more
Home

By Kevin Bailey, Managing Director & Principal - Security Research at Omnisperience  When I look back at the cybersecurity industry, in the early 2000s it involved a few hundred vendors battling for their share of a ~$750 million market. The hacker was motivated by the chase and notoriety rather than monetary rewards. Fast forward to 2020 and sophisticated hackers have now established a matrix structure comparable to multinational corporations with the discipline, skills, diversity of...

Read more
WFH

By Prof. John Walker To say we live in unprecedented times must be the understatement of the century – in fact, what we have seen in recent years does amount to gross disbelief. Terrorist attacks finding their way to the streets of the UK, active Russian agents seemingly acting with murderous impunity, whilst looking wondrously up at Church Spires, not to mention the murder of a US based journalist within the walls of a Egyptian...

Read more
wfh

In the span of a couple months, the world as we knew it was turned upside-down. As scientists across the globe conduct experiments in search of the COVID-19 vaccine, the labour market has found itself within its own experiment. That is, the experiment of remote working on a massive scale.   In an effort to slow down the spread of the virus, millions of employees around the world are being told to write their emails, compile their spreadsheets, and hold their meetings from the confines of their dining room...

Read more
edgescan logo

A security software-as-a-service solution that continuously scans the entirety of an organisation’s digital assets is perhaps the clearest indicator of how much the cybersecurity world has changed since the old days, when one ad-hoc penetration test and an antivirus would do the trick. We asked Eoin Keary, CEO and founder of edgescan, to tell us more about this model of security how should ensure they are making an informed choice. Which organisations should consider adopting...

Read more
San Francisco view

With one of the most anticipated cybersecurity events of the year just around the corner, we thought to help you navigate around the 700 exhibiting vendors we’d highlight some of what a handful of those companies will be talking at the show. ‘The Human Element’ is the theme of RSA Conference 2020, but there is also a lot of noise around issues and challenges surrounding election security, open source tools, product security and anti-fraud. So, what...

Read more
padlock

Corin Imai, senior security advisor at DomainTools:  “Cybercriminal operations thrive off the kind of data that this database left exposed: sensitive personal identifiable information can be sold online and exploited in all sorts of subsequent campaigns. Fortunately, security researchers promptly brought the misconfiguration to the attention of Estee Lauder, who quickly secured the database. Although there is no evidence that data was stolen, people potentially affected should be weary of any email they receive that requests...

Read more
Page 3 of 42 1 2 3 4 42