Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Unsecured Internet-facing database attracts hackers in a matter of hours

You only have to read the news on this very website to find countless stories of instances where companies have inadvertently left a database exposed on the web - it’s every security professional’s worst nightmare.   Researchers at Comparitech, who will often be the source of finding these misconfigured databases to alert the unsuspecting company, decided to set up a honeypot experiment to see just how little time it would take before such a database...

Read more
One Identity Safeguard now offers free Personal Password Vault

One Identity has recently introduced a new feature within One Identity Safeguard for Privileged Passwords 6.6, which manages and secures the use of corporate personal passwords to access corporate third-party accounts. Corporate users can store their passwords for online accounts to services within a new Personal Password Vault. By leveraging the feature - which is free for all users at Safeguard licensed companies - organisations can ensure proper control over, as well as policy adherence...

Read more
European Cybersecurity Blogger Awards 2020 – Winners Announced!

The winners of the 2020 European Cybersecurity Blogger Awards were announced last night in an event with a twist. Forgoing the usual booze up in a pub close to Infosecurity Europe this year, the awards ceremony went virtual! And thanks to Qualys, the headline sponsor, cocktail kits were sent to all registered finalists to join in for an online cocktail-making class given by Patrick Fogarty of Doctor Ink’s Curiosities / Stir Crazy. Judges Yvonne Eskenzi...

Read more
Securing Docker with CIS Controls

Containers, along with orchestrators such as Kubernetes, have ushered in a new era of application development methodology, enabling microservices architectures as well as continuous development and delivery. Docker is by far the most dominant container runtime engine, with a 91% penetration according to the State of the Container and Kubernetes Security Report. Containerization has many benefits and as a result has seen wide adoption. Gartner predicts that by 2023, 70% of organizations will be running...

Read more
Case study: Softcat Prevails Over Cybercrime With KnowBe4

With a multitude of awards, ranging from CRN’s ‘Public Sector Reseller of the Year’ to Great Places to Work and Best Managed IT Provider, Softcat is one of the largest and most reputable resellers of technology solutions and services in the United Kingdom. Its team of over 1,300 employees in offices across Britain and Ireland, help clients to find the right software for their needs, provide expert advice and support organisations through full infrastructure transformations....

Read more
at&t cybersecurity

As organisations rapidly adapt to a virtual business model and remote workforce, as a result of COVID-19, it has become even more challenging to identify and mitigate cyber threats. Therefore, the survival of a business, and its wider industry, could depends on its overall cybersecurity maturity and alignment to security best practises.   AT&T Cybersecurity partnered with the Enterprise Strategy Group (ESG) in order to assess organisations’ postures across the five foundational cybersecurity functions of the NIST...

Read more
cheerful-senior-mother-and-adult-daughter-using-smartphone

The topic of the NHSX COVID-19 contact tracing app has been at the centre of many security debates lately. The discussion has been fuelled by security professionals, conspiracy theorists, and everyone in-between. However, many of the voices have not represented the British population that the application is designed to protect. With this in mind, Anomali, a cybersecurity company specialising in threat intelligence and analysis, conducted a survey of the British public in order to ascertain...

Read more
open source

Without a doubt, the role of open source is pivotal to software development across the board. Indeed, the software security corporation, Synopsys, has affirmed that open source constitutes seven out of ten lines of code on the average application. Among the most popular were jQuery which could be found in more than half (55%) of codebases, followed by Bootstrap with 40% and Font Awesome with 31%. However, what is truly concerning is the widespread neglect...

Read more
remote work

Covid-19 has radically altered almost every aspect of day-to-day life in hundreds of nations: Socialising, working, travelling and exercising have all been impacted. But once the initial shock of the pandemic is brought under control, how will our worlds change long term? According to a new survey, remote working is one element which organisations should consider here to stay.  The global survey commissioned by identity and access management solution OneLogin, six out of ten people...

Read more
Computer with encryption

From: Thomas, Kevin Sent: 24 August 2019 10:43 To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, Javvad Sent: 24 August 2019 11:03 To: Thomas, Kevin Subject: Encryption Hi Kevin, Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those...

Read more
Page 2 of 25 1 2 3 25