Featured

10 Steps To Get Started In Cybersecurity Careers: What High-Achievers Do While Others Don’t.

By: Emin Caliskan, Cybersecurity Trainer, Career Mentor and a finalist in the Security Leader/Mentor category in the Security Serious Unsung Heroes Awards 2019. When it comes to cybersecurity skills shortage discussions, I genuinely admire our colleagues & academics when they advise "companies" to stop looking for best-of-the-best and give opportunities to job seekers (internship, entry-level position etc.) But here's the blunt truth: that's NOT going to happen. I am sorry to say this, especially for...

Read more
UK FinTech CashFlows Continues Growth With Akamai In Face Of Increasing Cyberthreats.

Akamai (NASDAQ: AKAM), the intelligent edge platform for delivering and securing web experiences, today announced it is protecting CashFlows, an innovative FinTech offering comprehensive merchant services, alternative payments, and BIN Sponsorship solutions (card issuing and ATMs), from the growing threat of Distributed Denial of Service (DDoS) attacks against its cloud-based services. Founded in 2010, CashFlows was one of the first independent UK payments institutions accepted as a principal member of both Visa and Mastercard. As...

Read more
Over Two Thirds Of British Companies Feel Cybersecurity Concerns Prevent Them From Adopting New Technology.

Over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster, according to a new report from EY that is based on a survey of 175 C-suite executives at UK-based organisations. Cloud computing and the internet of things (IoT) were the two technologies that were perceived to pose the greatest cybersecurity risks. Mike Maddison, EMEIA Advisory Cybersecurity Leader, EY says: “There is pressure for companies...

Read more
SOAR vs. Security Operations: What’s Really Going On?

Written by John Czupak, CEO, ThreatQuotient There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us are equally confused about the fundamental capabilities of these technologies, and more pointedly, what problems they aim to solve. Perhaps...

Read more
Five Steps To Defending Against And Recovering From A Cyber Attack.

Given how commonplace cyber attacks have become on a global basis, the topic of cyber security is moving increasingly up the board agenda, and rightly so. 72% of large businesses in the UK said they had identified at least one cybersecurity breach in 12 months and 40% experienced a breach or attack at least once a month. Clearly, businesses are aware of the prevalence and potential damage that attacks can cause. But how can they...

Read more
Is There Room For New MSSPs To Enter The Cyber Security Market?

Written by Bernard Parsons, CEO and Co-Founder, Becrypt While the MSSP model is far from new, and many well established MSSPs with comprehensive offerings exist, there seems to be no shortage of traditional Value-Added Resellers (VARs) still keen to transition to the model. There is still opportunity for these VARs, given the dynamic nature of the cyber security market. So, when we talk about an MSSP, what exactly do we mean? Here is Gartner’s working...

Read more
Demystifying Data Subject Access Requests.

One year on from the introduction of the General Data Protection Regulation (GDPR) and it is becoming clear that when it comes to Data Subject Access Requests (DSAR), organisations are confused regarding a desire to balance the rights of an individual with the needs of an organisation, John Potts (Head of DPO DSAR and Breach Support) GRCI Law, outlines the essential processes that companies must put in place to avoid falling foul of DSAR breach....

Read more
BlackBerry Again Positioned As A Leader In Gartner’s 2019 Magic Quadrant For Unified Endpoint Management Tools.

BlackBerry Limited (NYSE: BB; TSX: BB) today announced its position, for the fourth consecutive year, in the Leaders quadrant for unified endpoint management (UEM) and inclusion in the 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report by Gartner, Inc., the world’s leading research and advisory company. This Magic Quadrant evaluates the ability to execute, and completeness of vision, of vendors in the unified endpoint management (UEM) market. BlackBerry’s unique approach to UEM leverages...

Read more
Greenbone Introduces Virtual Appliances For Vulnerability Management.

Greenbone, a leading provider of vulnerability analysis for IT networks, today announced that its proven portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone’s customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch security-relevant vulnerabilities in IT systems, helping businesses reduce their exposure to risks and improving the overall resilience of their infrastructures....

Read more
The Challenges Of Cobalt Strike Server Fingerprinting.

By Jason Reaves, and Joshua Platt, Principal Threat Researchers at Flashpoint The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn’t stopped individuals and collectives with malicious intent from pirating or hacking these tools and using them to nefarious ends. Cobalt Strike is one such...

Read more
Page 1 of 15 1 2 15