Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Anatomy of an Advanced Persistent Threat

By Tarik Saleh, Senior Security Engineer at DomainTools Advanced Persistent Threats are long term patterns of network exploitation that go undetected for extended periods of time and are usually aimed at high profile targets such as governments, higher education institutions, political activists, and companies. They are often motivated by economic, political, and financial reasons, and the attacks tend to be highly targeted, resourceful, and risk tolerant.   The typical APT involves several phases:   Infiltration/Initial compromise:  This...

Read more
I think therefore IAM

“I think therefore I am.” - René Descartes This isn’t just a pompous philosophical proposition of autonomy, instead it is a timely piece of advice for ensuring corporate cybersecurity. Descartes really was ahead of his time! Identity and access management (IAM) plays an important part in securing your IT infrastructure by mitigating risk from both external cyberattack, and internal threat. Any company that thinks seriously about protecting sensitive information about their employees or customers should...

Read more
phishing keyboard

Another day, another phishing campaign.   MailGuard, the email spam and virus filter, has identified a new fraudulent email campaign that has been targeting inboxes across Australia.   The scam email is designed to look like a notification from Telstra, with the subject: “$500 Citibank prepaid gift card reward.” Once opened, the message displays the telecommunications giant’s logo, complete with a display name ‘Telstra’ and a domain to match.   The email actually originates from a single, forged email address,...

Read more
Incident Response

By Zeki Turedi, Technology Strategist, EMEA at CrowdStrike Organisations attempting to protect their data currently face an unprecedented threat level. The World Economic Forum’s Global Risks Report 2019 ranked data theft and cyber attack as two of the top five global risks in terms of likelihood. Even the largest and best-equipped of international organisations have shown they’re susceptible to attack from persistent, skilled adversaries.  Much like insuring your home against flooding (more information here), you need to protect your...

Read more
By Karl Lankford, Director of Solutions Engineering, BeyondTrust

The world is an uncertain place, particularly for cybersecurity professionals – many of whom have learned the hard way that they can’t rest on their laurels. While new technologies and methods of attack are always emerging, threats are constantly attacking organisations from both outside and in. In an age where a cybersecurity incident is both imminent and expected, IT professionals need to know what to look out for and, crucially, how to best prepare for...

Read more
School Cybersecurity Teaching

By Jonny Mackley, Copywriter For some schoolchildren today, technology has been in and around their lives for as long as they can remember. Approximately 9 out of 10 households have access to the internet, and many own their own smartphones. It is therefore imperative that they are equipped with the necessary knowledge to keep them safe when it comes to browsing the web both for leisure and for work. Local police are known to come...

Read more
Try Hack Me Capture the Flag

Two young cyber security entrepreneurs are running their second HackBack virtual Capture the Flag (CTF) competition for teams from UK Universities. Ben Spring and Ashu Savani, who met as students during an internship at Context Information Security, developed the TryHackMe interactive platform to make it easier for students and other newcomers to learn cyber security skills. The HackBack2 event on 26 October (https://tryhackme.com/hackback2), which is exclusively sponsored by Context, already has 21 universities signed up. The teams of up to four people will access the TryHackMe platform remotely...

Read more
Security Serious Awards Eskenzi

As Bayside Comprehensive School Head of Physics, I’ve been a teacher for eleven years and started training students as part of a programme in the school for CyberCenturion in 2014. It began with seven students from Bayside, and to date has had over 100 young learners participate from both comprehensive schools, between the ages of 13 - 18. During these five years, the club reached the CyberCenturion finals in 2015, won the competition in 2016...

Read more
James Packer Security Serious Eskenzi

Our industry is one that is, at times, inherently pessimistic in its nature, because it has to be. We are professionals who dedicate ourselves to protecting against the worst case scenario, exploring how bad things could be and explaining the depths of the abyss so as to justify not diving in to it. This constant focus on things going wrong however can lead to a subconsciously negative outlook resulting in conscious connotations that serve no...

Read more
Security Serious Unsung Heroes Awards

The fourth annual Security Serious Unsung Heroes Awards  winners were revealed last night in a fun and inspiring celebration at St Bart’s Brewery in London. The awards celebrate the people, not products, of the cyber security industry. From the best ethical hackers and cybersecurity’s rising stars to the best security awareness campaign and the coveted Godparent of security, the categories recognised individuals and teams working hard to protect Britain from cybercrime and raise awareness of security issues.     The free event was...

Read more
Page 52 of 69 1 51 52 53 69