Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

malware

Non-malware attacks have experienced what you might call a renaissance over the past couple years. As we speak it is being reported that hackers have been targeting the upcoming Winter Olympics using fileless malware. Non-malware attacks, also known as fileless attacks, use trusted programmes, native to operating systems, to gain control of computers. Virtually every organisation examined by the Carbon Black Threat Analysis United (TAU) was targeted by non-malware attacks in recent research. And since...

Read more

A new study from LastPass and Ovum reveals that despite the clear and present danger that passwords pose to organizations, many remain focused on implementing technology based on features and policy, not the user, to address the problem. More than half of IT executives surveyed rely on employees alone to monitor their own password behavior, subsequently leaving the company at risk, shining a light on the disconnect between IT policy and human behavior. The report,...

Read more

One Identity, a Quest Software business and proven leader in helping organisations get identity and access management (IAM) right, today announced the acquisition of Balabit Corp., a leading provider of privileged access management (PAM), privileged account analytics and log management solutions that help businesses reduce the risk of data breaches associated with privileged accounts. Balabit’s PAM solution provides protection from threats posed by high-risk, privileged accounts, while its privileged account analytics solution provides an additional...

Read more

A10 Networks (NYSE: ATEN), a Secure Application Services™ company, today announced the A10 DDoS Protection Cloud, powered by Verisign™, and the A10 Thunder® 1040 TPS appliance offering advanced on-premise protection. With the availability of the latest A10 DDoS protection solutions, A10 delivers full spectrum enterprise protection to detect and mitigate distributed denial of service (DDoS) attacks.   A10 Networks’ hybrid approach to DDoS defences combines surgical precision on-premise protection with orchestrated cloud scrubbing, delivered in...

Read more

Flowmon Networks, a vendor of advanced monitoring and security solutions for network infrastructures, announced today that it has joined F5 Networks’ Technology Alliance Program (TAP). Together they will bring automated DDoS protection solution to service providers and enterprises. The latest outbreaks, such as Mirai botnet utilising IoT vulnerabilities, have shown that the DDoS attack landscape is entering a new phase. With IoT, attackers have uncovered a new vector of lucrative denial-of-service extortions with unprecedented magnitude....

Read more

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related for a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. As the issues in cyber have evolved, so too has the role of the CISO,...

Read more

YOUNG girls from across the country will pit their codebreaking skills against one another in a series of head-scratching online challenges to crown the UK’s brightest cyber minds. Registration for the online phase of the 2018 CyberFirst Girls Competition, run by the National Cyber Security Centre (NCSC), part of GCHQ, opens today . NCSC and GCHQ experts have devised 100 challenges of varying difficulty for female pupils aged 12 to 13 to complete during the...

Read more
cybersecurity

ThreatMetrix, The Digital Identity Company, today revealed that 2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks—as seen across its global network, which analyses 100 million transactions a day— the ThreatMetrix Cybercrime Report 2017: A Year in Review confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these attacks are thwarted by organisations...

Read more

With less than nine months to go until Global Data Protection Regulations (GDPR) come into force across the European Union, businesses should be well underway in their efforts to achieve compliance. However, meeting the demands of GDPR is easier said than done and a substantial proportion of businesses are still showing a worrying lack of preparedness. According to a study released in July by Spiceworks, just five per cent of IT pros in the UK...

Read more

A security flaw has been discovered on the AMD PSP (Platform Security Processor), which is a chip-on-chip security system, that stores critical system data such as passwords, certificates, and encryption keys, in a secure environment and outside of the more easily accessible AMD cores. AMD has fixed but not released the firmware updates. Much like the Intel ME, the AMD PSP is an integrated coprocessor that sits next to the real AMD64 x86 CPU cores....

Read more
Page 62 of 296 1 61 62 63 296