Eskenzi PR ad banner Eskenzi PR ad banner

News

Securing Crypto Assets On The Blockchain.

We have witnessed cryptocurrency's rise from speculation to popularity because of the many benefits it offers and the financial gaps it has managed to fill in many industries, including finance, retail, entertainment, and many more. Some of the most commended benefits are the increased security and privacy that cryptocurrency use offers as compared to traditional forms of payment.  In this article, we will look at the ways in which cryptocurrency transactions can protect your sensitive...

Read more
23andMe shifts blame to users for data breach

The DNA testing company 23andMe has had a rough few months - first reported in October that data had been breached - and now, the response to those breaches due to customers taking legal action against the company. In an almost bizarre twist, 23andMe has stated in a letter that plaintiffs who had moved to take legal action against the company under the California Privacy Rights Act (CRPA) were indeed not affected by any security...

Read more
Google bins inactive accounts

Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re signed in to your Google Account”: Reading or sending an email Using Google Drive Watching a YouTube video Sharing a photo Downloading an app Using Google Search Using Sign in with Google to sign in...

Read more
Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows

Employee violations of an organisation’s information security policies are as dangerous as external hacker attacks according to a recent study from Kaspersky. In the last two years, 26% of cyber incidents in businesses occurred due to employees intentionally violating security protocol. This figure is almost equal to the damage caused by cybersecurity breaches, 20% of which occurred because of hacking. There is a well-established perception that human error is one of the main causes of...

Read more
Two computer screens filled with code. Shadowed figure.

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to detect human behaviour based on cursor positions to avoid automated security analysis. The Malware-as-a-Service (MaaS) model poses a significant threat in the realm of cybersecurity. This model allows individuals or groups with limited technical expertise...

Read more
Person on laptop. Google open.

Security awareness and training company SoSafe has announced the launch of the next-generation of personalised learning. The news was revealed at their Human Firewall Conference earlier this week. This latest innovation aims to make secure behaviour second nature for humans.  SoSafe’s personalisation engine multiplies the learning effect while saving up to 30% of time investment of employees. Users are set to benefit from a data-driven individualised learning journey, receiving targeted content that addresses their unique...

Read more
it security

Have you ever considered why your online bank account has so many checks before you can see your balance? Or why your workplace might require a special card to get past the front door? At the heart of all these measures is a critical concept we're all becoming more familiar with, whether we realize it or not — what is identity security. It's about making sure that the individual trying to access services or information is...

Read more

The integration of Artificial Intelligence (AI) into the corporate world has been transformative, reshaping the way businesses operate and make decisions. As organisations seek to leverage AI for improved efficiency and competitiveness, it is essential to examine the advantages and disadvantages associated with its implementation. What Are the Pros of AI in the Corporate World? One of the primary advantages of AI in the corporate sphere is its ability to streamline processes and enhance overall...

Read more
Keeper Security study shows cultural changes imperative to improve cyber incident reporting

Keeper Security, a provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, has announced that Keeper Secrets Manager (KSM) can now be integrated with ServiceNow. This integration enables enterprises to manage and protect their secrets with a fully managed, cloud-based platform that is both affordable and easy to deploy.   KSM is Keeper’s platform for securing infrastructure secrets such as API keys, database passwords, access keys, certificates and...

Read more
Bitwarden Revolutionises Online Security with Passkey Management

Bitwarden has introduced a ground-breaking feature: passkey management. This innovation empowers every Bitwarden user to create, handle, and securely store passkeys within their vaults. With the Bitwarden web extension, users can effortlessly and securely access passkey-enabled websites. These synchronised passkeys are meticulously encrypted within users' vaults, offering a seamless and passwordless login experience. A Secure, User-Friendly, and Encrypted Solution Regardless of their subscription plan, every Bitwarden user can now manage passkeys using the Bitwarden web...

Read more
Page 4 of 364 1 3 4 5 364