Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

cybersecurity

WORLD leading initiatives by the National Cyber Security Centre (NCSC) have detected and prevented millions of online commodity attacks against the UK, figures published today (February 5) have shown.   The results of the UK government’s new bold approach to tackling cyber crime are detailed in ‘Active Cyber Defence – One Year On’, a comprehensive summary compiled by the NCSC’s Technical Director Dr Ian Levy.   Four pioneering Active Cyber Defence (ACD) programmes – Web...

Read more
Hacker sinister threat

AlienVault researchers have listed Sofacy, also known as Fancy Bear or APT28, as the most capable hacking group in the world. This was based on ranking the top threat actors which have been reported the most frequently on the AlienVault Open Threat Exchange (OTX) Platform.   The results were then formulated to measure the cyber group's activity (the number of times AlienVault vendors reported them) alongside the measure of their known capabilities over the past...

Read more

By Jackson Shaw, VP of product management for One Identity Facial recognition and fingerprint scanning for device authentication are no longer futuristic concepts reserved for James Bond movies. In fact, biometrics seem to be gaining ground over their inferior cousin, the password, by the day. So, why do we all still have more passwords than we would care to remember? And whatever happened to the much-hyped “death of the password”? Three burning questions that dog...

Read more
cybersecurity

A10 Networks, a Secure Application Services™ company, today launched new research examining the behaviour and attitudes of the workforce towards the use of business and personal apps and its impact on risk, security and corporate culture. The Application Intelligence Report (AIR) was commissioned by A10 Networks and conducted independently with the intent to provide education for employers that helps them assess corporate policies and ultimately protect their businesses and applications by becoming more aware of...

Read more

Delphix, the company that has changed the dynamics of managing and consuming data, today announced that leading analyst firm KuppingerCole issued a new report outlining how businesses can prepare for data compliance challenges under the EU’s General Data Protection Regulation (GDPR). With just under four months until it takes effect, the report details immediate actions any global organisation can take to ensure they are not subject to millions - or billions - in fines and lost revenues....

Read more

Unfortunately, it has become critically important that we are vigilant when it comes to online security. Cyber crime has become so common that it is not just the global businesses that get targeted but smaller businesses and even personal online devices are now targeted. And there are so many different variations of cyber crime now that it is increasingly difficult for authorities to counter. For example, cyber crime involves hacking, viruses/malware, denial of service attacks...

Read more

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO,...

Read more

Any business that speaks to its customers is vulnerable to fraud. Whether it’s a conversation about telephone banking or a retail query, almost every conversation is full of security gaps and weaknesses – and hackers are always ready to jump on an opportunity to defraud a consumer and defame a business. Historically, these weaknesses have not been difficult to find. Criminals often favour phone fraud because voice is one of the easiest channels to hack....

Read more

ESET – a global player in information security – has been named as a Challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms*. The company was the only Challenger named in the Magic Quadrant. ESET was evaluated based on its ability to execute and completeness of vision. ESET believes this placement reflects its consistently improved competence to offer maximum protection for enterprises. The Gartner Magic Quadrant for Endpoint Protection Platforms report states, “Endpoint...

Read more

Good news for companies and researchers who use static analysis tools; Synopsys, a leading provider of software and programming security has announced an expansion of their industry-leading static analysis tool. For the latest version of their Coverity 2018.01 tool, which analyzes source code to detect critical quality and security defects early in the software development life cycle. Coverity 2018.01 extends the tool’s support for new programming languages, coding standards, and development tool integrations. “Secure, high...

Read more
Page 59 of 295 1 58 59 60 295