Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

DomainTools, Data, and Internet Safety

A part of the industry for around twenty years, DomainTools uses active and passive DNS (Domain Name System) data to create cybersecurity intelligence for its customers. Tim Durant, Vice President of Channels and Alliances, explained:  “DNS is like the fingerprints or the activity on the internet. So we’re mapping all those fingerprints.”   With unique sets of data, providing a different picture of cyber threat infrastructure than that which is typically provided, governments, enterprises, and other...

Read more
Salt and AWS

Salt Security, the API security company, has been accepted as part of the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program, to address the prevalence of API-driven businesses, along with how to secure them and not put customers at risk. ISV a co-sell program for AWS Partners who provide software solutions that run on or integrate with AWS. Acceptance, the company says, validates the proven integration of the Salt Security API Protection Platform...

Read more
Out of Date Risk Assessment Intel is Damaging Company Security says Armis

With results from more than 100 professionals in cybersecurity, Armis released a survey that explored the risks and struggles within the industry as the environment changes. As the landscape of cybersecurity changes rapidly, security intel being reported to companies may be constantly outdated. According to the results, while top management in companies in the past 6 months have spent more time involved with cybersecurity concerns, almost 23% of the professionals surveyed believed that board members...

Read more
security culture

KnowBe4, the provider of security awareness training and simulated phishing platform, has conducted a survey during Infosecurity Europe, which evaluated the opinions of nearly 200 security professionals towards security culture, or more specifically: the ideas, customs and social behaviours of an organisation that influence their security practices. The research found the threat of cyber warfare (30%) or experiencing a data breach or cyberattack (30%) were the two biggest reasons why security professionals wanted to improve...

Read more
The Must-Attend Cybersecurity Event: International Cyber Expo

The UK Cyber Security Council, International Cyber Expo and ITN Business will be co-creators of a unique news-style programme produced to raise awareness and understanding of cyber security. The Information Age has brought enormous economic and social progress to many parts of the world and has proved to be a powerful tool for connectivity, freedom and innovation. The rise in ever more sophisticated internet-based technologies will further accelerate the way organisations and communities communicate and...

Read more
A shifting paradigm – Virsec’s deterministic approach to cybersecurity

Virsec has come a long way in the past few years. As recently as 2017, its technology only focused on memory protection. 5 years, $137 million in funding and the addition of host and feedback protection later, the company is looking to revolutionise cybersecurity, quite literally, from the inside out.  Greg Kelton, Regional Director of Europe at Virsec, is on the frontlines of that revolution. The enemy? Dwell time. “We’re seeing a monumental shift in...

Read more
A Vulnerability Management Program is Nothing Without Identity Risk Protection

“Identity is the number one security concern.” Tim Nursall, Field Engineer at Illusive spoke at Infosecurity Europe last week on identity risk and the Analysing Identity Risks Report.   --  So, what is identity risk? With the migration of networks to the cloud and the overall shift towards remote work and off-premises devices, the historically understood network perimeter has changed entirely. Through endpoint vulnerabilities and privileged credentials, attackers can now breach a system through a multitude...

Read more
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

“An attacker only has to be right once, but the defender must be right all the time.” Etay Maor, Sr. Director of Security Strategy of Cato Networks, disagrees. According to him, this is one cybersecurity myth he wishes to dispel.   --  Cato Networks, a cloud-native service that offers network connectivity and security to its customers, was represented at Infosecurity Europe in London 2022 by Senior Director of Security Strategy, Etay Maor. Having researched into patterns...

Read more
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

Vice President of Product Marketing at Cato Networks, Eyal Webber-Zvik, representing the world’s first SASE platform, spoke last week at Infosecurity Europe. Topic of discussion? Cloud-native single pass processing in action.  --  Following Gartner’s introduction of Secure Access Service Edge (SASE) as a concept in 2019, Cato Networks was able to build the world’s first SASE platform, the convergence of wide area networking (WAN) and network security devices into one single cloud-delivered service. Customers of...

Read more
Over a Decade in Software Security: What Have We learned?

With over a decade experience in software security, what can Synopsys teach us? Managing Consultant Adam Brown presented this very subject at Infosecurity Europe 2022, with the help of Synopsys’s BSIMM metrics. The Building Security in Maturity Model (BSIMM) is an assessment done by Synopsys that helps firms analyse the state of their software security. This understanding then allows these firms to repair where they are going wrong. Currently on the 12th iteration of BSIMM,...

Read more
Page 26 of 69 1 25 26 27 69