Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Manipulation by Disinformation: How Elections are Swayed

In 2016, we witnessed as the Trump and Brexit campaigns leveraged the help of Cambridge Analytica to spread disinformation and sway voters in their favour. While Cambridge Analytica has since been dissolved, the threat of disinformation is ever-present. In many ways, it is a threat that arguably dates back to ancient times and what we see today is simply its amplification on a global scale. We invited a number of special guests to compare and...

Read more
Waving Goodbye to Enterprise Passwords

Hitachi Europe limited and My1Login have announced a Technology Partnership to deliver enhanced security solutions to address one of the cybersecurity industry’s most compelling challenges – passwords. The combined solution optimises security and convenience whilst enabling a significant ROI as a result of a number productivity and efficiency benefits. The two companies will deliver solutions utilising Hitachi’s VeinID Five product together with My1Login’s Identity and Access Management software to eliminate the need for passwords in...

Read more
Securonix

As workplaces are becoming more remote, with almost half of the workforce working from home, and an introduction of bring your own device policies in many organisations, endpoints have become more distributed and cyberattacks even more prevalent. Remote workforces are creating more vulnerabilities for endpoints as they are no longer located in secure networks, making endpoints an increasingly critical vector for advance threats in dire need of protection. Secureonix has recently announced an integration with...

Read more
Ava Security Webinar Panel discussion promo

Our editor, Tony Morbin, sits down with an experienced panel of cybersecurity professionals to discuss how to stay ahead of cybercriminals Often, employees get a bad rep when it comes to cybersecurity as they are often branded as the "weakest link in the cyber chain". However, Ran Puchag, Chief Product and Development Officer firmly believes that employees can actually contribute to a better security posture overall, and he is not alone! Throughout this panel discussion,...

Read more
Losing the will to Zoom infographic

A little over 7 months ago barely any of us had heard of Zoom, but since the pandemic, its users have jumped from 10 million to 300 million at its peak. Yet with Zoom calls becoming part of our everyday workplace routine, you may be surprised at the habits that many Brits have adopted. A survey of 1000 people working from home due to COVID-19 and commissioned by Eskenzi PR, a global tech PR agency,...

Read more
Security Serious Unsung Heroes Awards 2020 Winners Announced

The fifth annual Security Serious Unsung Heroes Awards winners were revealed last night during a socially distanced virtual awards ceremony. The awards celebrate the people, not products, of the cybersecurity industry. From the best ethical hackers and cybersecurity’s rising stars to the best security awareness campaign and the coveted Godparent of Security, the categories recognise individuals and teams working hard to protect Britain from cybercrime while raising awareness of security issues.        The free event was a chance for the UK cybersecurity industry to come together, catch up with familiar faces and...

Read more
Women in cyber – diverse talents and the barriers to acceptance

Three women at BAE Systems Applied Intelligence, exemplify some of the various opportunities for women in cyber, with diverse backgrounds, skillsets and routes into the sector ranging from programmer to comms, or transitioning from social science to threat intel. Using their own experiences of progressing in a male-dominated sector, they explain their role, the challenges and consider what changes could redress the underrepresentation of women in cyber. Mivy James, Head of Consulting at BAE Systems...

Read more
Security lock and chain on gate

By Trevor J Morgan, product manager at comforte AG The cloud is an incredibly useful tool for businesses and enterprises that process huge amounts of information. Over recent years, cloud adoption has increased substantially. Indeed, the public cloud service market is expected to reach $623.3 billion by 2023 worldwide as more businesses look to expand operations but lack the tools or resources to deploy inhouse cloud operations. This is especially true for enterprises that process...

Read more
Strategies for overcoming male domination in cyber

People come into cyber security from a wide range of backgrounds, but the usual image is of a core cadre of techies depicted as having progressed from being boys in bedrooms hacking into games –  but that’s not true, rather, it was only ever part of the picture, with women also involved in every step of the nascent cyber security industry. Joan D Pepin, Chief Security Officer at AuthO is a great example. She explains...

Read more
Hybrid physical-cyber security threats drive supplier integration

As the cyber and physical worlds collide and interact, so the defences in each are now integrating with an example this month being the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider to form Ava Security. Tormod Ree, CEO of Ava Security commented: “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the...

Read more
Page 42 of 68 1 41 42 43 68