Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Purple teaming in cybersecurity refers to a collaborative approach that aims to enhance an organisation's security posture by integrating the efforts of both the red and blue teams.  This approach enables real-time learning and adjustment, enhancing the organisation's ability to detect, respond to, and mitigate threats.  Purple Teaming emphasises continuous improvement in security practices, tools, and techniques, making it a dynamic and proactive defence strategy.  Organisations can better understand their vulnerabilities through regular and iterative...

Read more
Adarma Collaborates with Scottish Enterprise to Unveil Neurodiversity Strategy

Adarma has today announced its neurodiversity strategy in partnership with Scottish Enterprise, Scotland’s national economic development agency. The strategy supports Adarma’s continued commitment to attract, support, and empower people from diverse backgrounds into the cybersecurity sector, which will help combat the well-documented skills shortage in the cybersecurity sector. Adarma employs over 300 people and believes that diversity and a sense of inclusion within its workforce helps to better serve their customers through improved problem-solving, innovation...

Read more
Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional computers - could potentially turn data security on its head. IBM, Microsoft and Google have already turned their...

Read more
Data Privacy Day 2024: Part 1

With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends... Allon Mureinik, senior manager, software engineering at the Synopsys Software Integrity Group: "In today’s world of social media and open-source development, sharing seems to be the social norm. After all, we were all taught that sharing is caring. This is true not only for individuals but for companies too – whether intentionally on their social media accounts...

Read more

Password managers have become integral tools for individuals and businesses alike. They are primarily known for securely saving and managing login credentials so users don’t have to remember them all or write them down, where they could be compromised. However, these digital guardians can offer more than just a secure vault for passwords. In fact, a good password manager can play a crucial role in enhancing both the personal and professional aspects of a user’s...

Read more
New research reveals disconnect between global university education and recruitment standards

New research conducted in the UK and US reveals that over three-quarters (78%) of cybersecurity and IT professionals believe a traditional university education in cybersecurity is not doing enough to prepare graduates for the modern workforce. Meanwhile, nearly two-thirds (64%) of cyber industry professionals say current recruitment processes inadequately assess candidates' practical skills. This is according to a new study called ‘Securing the future of cybersecurity: From classroom to every career stage’ from Hack The...

Read more
Nominations Open for The Most Inspiring Women in Cyber Awards 2024

The nominations for the 4th annual Most Inspiring Women in Cyber Awards, sponsored by BT and ThinkCyber and hosted by Eskenzi PR, have opened. The event, to be held on the 27th February 2024 at the BT Tower in London, will honour the 25 most inspiring women in the cybersecurity industry. The awards are also supported by media partners Assured Intelligence, Women in Cybersecurity (WiCyS) UK & Ireland Affiliate and the IT Security Guru.  In...

Read more
23andMe shifts blame to users for data breach

The DNA testing company 23andMe has had a rough few months - first reported in October that data had been breached - and now, the response to those breaches due to customers taking legal action against the company. In an almost bizarre twist, 23andMe has stated in a letter that plaintiffs who had moved to take legal action against the company under the California Privacy Rights Act (CRPA) were indeed not affected by any security...

Read more

Today, Synopsys released BSIMM14, the latest iteration of its annual Building Security In Maturity Model (BSIMM) report. This comprehensive analysis delves into the software security practices of 130 organisations, encompassing leading companies across various industries such as cloud, financial services, FinTech, ISV, insurance, IoT, healthcare, and technology. The report highlights a significant surge in the adoption of automated security technology, contributing to the widespread embrace of the "shift everywhere" philosophy. This philosophy entails conducting security...

Read more
Google bins inactive accounts

Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity. The company defines activity as “actions you take when you sign in or while you’re signed in to your Google Account”: Reading or sending an email Using Google Drive Watching a YouTube video Sharing a photo Downloading an app Using Google Search Using Sign in with Google to sign in...

Read more
Page 3 of 70 1 2 3 4 70