Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

computer

As the COVID-19 virus spreads around the world and we invest in hand sanitiser to protect our physical hygiene, many are falling victim to coronavirus phishing scams and failing to protect their cybersecurity hygiene. In the face of this pandemic and the growing climate of fear and misinformation, leading information security professionals have given their advice on what steps to take to ensure online security is preserved despite emerging cyber threats…   Eric Howes, KnowBe4...

Read more
Woman in grey working from home

By Elad Shapira, Head of Research at Panorays In the wake of coronavirus, companies are shifting their workforce to remote locations to keep businesses underway. This is an attempt to keep workers healthy and semi-quarantined to protect against the spread of a world pandemic that is not only a threat to health, but also to the world’s economies. The list of global organizations mandating work-from-home policies includes Microsoft, Apple, Google and Amazon, and that list...

Read more
Face Mask

By Rita Selvaggi, CEO of ActivTrak The global reach of the coronavirus has elevated the discussion around the need for “social distancing” and working remotely to avoid spreading the infectious virus. Global companies like IBM, Goldman Sachs, and PwC are asking employees to work from home, as are smaller organisations, such as Seattle-based online payment company Stripe. As organisations consider having employees work from home on a more massive scale, it’s important to recognise that...

Read more
Anomali Logo

Review by: Dave Mitchell Supplier: Anomali Website: www.anomali.com Price: Based on size of organisation Scores: Performance 5/5 Features 5/5 Value for Money 4.5/5 Ease of Use 4/5 Overall 5/5 Verdict: Anomali weaponizes your cyber security teams by providing all the intelligence they need to detect, assess and mitigate threats. Enterprises that rely on reactive responses to cyber threats are asking for trouble. Ever increasing numbers of businesses are only discovering data breaches often months after...

Read more
Nozomi Networks Wins Award for OT & IoT Cybersecurity Innovation

Nozomi Networks Inc. is proud to announce it has won the Market Leader: Operational Technology (OT) & Internet of Things (IoT) Cybersecurity award from Cyber Defense Magazine (CDM).   “We’re thrilled to receive this coveted cybersecurity award from Cyber Defense Magazine,” said Nozomi Networks CEO Edgard Capdevielle. “It’s an honour to be recognised not only for the industry’s most advanced solutions in OT visibility and security, but also for the innovative work we are doing...

Read more
Internet screen security protection

Securonix, Inc. today announced the launch of the Securonix Analytics Sandbox capability, which provides an isolated test or QA environment within the production setup. This enables security operations teams to test, tune, and validate new use cases prior to pushing them to live production.   “Security operations teams are in a catch 22 - they must update use cases rapidly to stay ahead of evolving threats, but must do so in a way that does not...

Read more
Hermiston Generating Plant, Hermisto, OR

The American Cybersecurity and Infrastructure Security Agency (CISA) has announced that an American critical infrastructure operation has been affected by ransomware attacks. The attack was caused by a Spearphishing technique that targeted workers of a natural gas compression facility. The ransomware encrypted the plant’s IT and OT networks causing a partial loss of view for human operators. While the attack only infected Windows devices, the impact of human-machine interfaces had a significant impact. In light...

Read more
Synopsys Code Sight

The increasing pace of development is shifting the responsibility for application security left, all the way onto the developer’s desktop. But dealing with security issues detected in downstream builds and tests can be very disruptive. By the time defects are reported, developers have moved on to their next tasks. To remediate a problem, they have to interrupt what they are doing and go back, reopen the code, make a fix, and retest. To make matters...

Read more
Tripwire logo

New research has revealed 83 percent of IT security professionals feel more overworked going into 2020 than they were at the beginning of 2019, according to a Tripwire survey. The research, which was in partnership with Dimensional Research, examined how organisations and security pros are coping under the strains of the skills gap. Having surveyed 342 IT security professionals it was also found that 82 percent of security pros felt that their teams were understaffed....

Read more
something shiney and spacial

As we all know, the world of cybersecurity is an ever-evolving, fast-growing industry that can be tough to follow at times. For example, we have seen a rapid upsurge in the use of smart devices and with that, an increased risk of cyberattacks. This has not been limited to private households either. Rather, the logistics industry and private vehicles are also at risk of being hacked. Indeed, as individuals and industries increasingly move online, this...

Read more
Page 49 of 69 1 48 49 50 69