Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Five Steps To Defending Against And Recovering From A Cyber Attack.

Given how commonplace cyber attacks have become on a global basis, the topic of cyber security is moving increasingly up the board agenda, and rightly so. 72% of large businesses in the UK said they had identified at least one cybersecurity breach in 12 months and 40% experienced a breach or attack at least once a month. Clearly, businesses are aware of the prevalence and potential damage that attacks can cause. But how can they...

Read more
Is There Room For New MSSPs To Enter The Cyber Security Market?

Written by Bernard Parsons, CEO and Co-Founder, Becrypt While the MSSP model is far from new, and many well established MSSPs with comprehensive offerings exist, there seems to be no shortage of traditional Value-Added Resellers (VARs) still keen to transition to the model. There is still opportunity for these VARs, given the dynamic nature of the cyber security market. So, when we talk about an MSSP, what exactly do we mean? Here is Gartner’s working...

Read more
John Potts Head of DPO, DSAR and Breach Support, Incident Response Management and Data Subject Rights

One year on from the introduction of the General Data Protection Regulation (GDPR) and it is becoming clear that when it comes to Data Subject Access Requests (DSAR), organisations are confused regarding a desire to balance the rights of an individual with the needs of an organisation, John Potts (Head of DPO DSAR and Breach Support) GRCI Law, outlines the essential processes that companies must put in place to avoid falling foul of DSAR breach....

Read more
Mark Wilson

BlackBerry Limited (NYSE: BB; TSX: BB) today announced its position, for the fourth consecutive year, in the Leaders quadrant for unified endpoint management (UEM) and inclusion in the 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report by Gartner, Inc., the world’s leading research and advisory company. This Magic Quadrant evaluates the ability to execute, and completeness of vision, of vendors in the unified endpoint management (UEM) market. BlackBerry’s unique approach to UEM leverages...

Read more
Vulnerabiltiy Management button

Greenbone, a leading provider of vulnerability analysis for IT networks, today announced that its proven portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone’s customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch security-relevant vulnerabilities in IT systems, helping businesses reduce their exposure to risks and improving the overall resilience of their infrastructures....

Read more
Fingerprint Biometrics Computer

The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn’t stopped individuals and collectives with malicious intent from pirating or hacking these tools and using them to nefarious ends. Cobalt Strike is one such tool that is being widely abused, and if your organisation has...

Read more
70% Of Financial Companies Suffered A Cyber Security Incident In The Last 12 Months.

New research by data security company, Clearswift, reveals that 70% of financial companies have experienced a cyber security incident in the past year, highlighting the serious threat that both data breaches and malicious attacks pose to the UK’s financial sector. The research, which surveyed senior business decision makers within enterprise financial organisations in the UK, found that almost half of the incidents reported over the past 12 months originated from employees failing to follow security...

Read more
Tackling The Digital Identity Security Crisis With Biometric Fingerprint Technology.

By David Orme, Senior Vice President of IDEX Biometrics ASA Digital identity, also known as an amalgamation of information available online that can bind a persona to an individual, is changing the face of personal identity as we know it. In a similar way to its physical counterpart, digital identity can be used to authorise an individual’s access to something that may otherwise be restricted. In the online world, a username, email or password can...

Read more
Cyberfort Group Launches To Support Business Growth Through Cybersecurity.

As cyber-attacks continue to increase in sophistication, businesses urgently need to catch-up on detection and defence without compromising on commercial viability. Cyberfort Group, a new breed of cybersecurity provider, has launched to help businesses maximise growth while solving their biggest challenges with cybersecurity strategy. Cyberfort provides expert cyber advice and consultancy, alongside a comprehensive range of cybersecurity products and services. Its mission is to help organisations make better security decisions, achieve compliance and improve data...

Read more
Contis Establishes PSD2-Ready, Automated Fraud Detection In Record Time With Featurespace.

Featurespace, the leading provider of Adaptive Behavioral Analytics for fraud detection and risk management, announced the seamless, 92-day, on-premise enterprise delivery of its ARIC Fraud Hub with Contis, an award-winning banking, payments and processing solution provider. Contis selected Featurespace's ARIC Fraud Hub in late 2018 to detect and prevent transactional fraud in real-time and began its integration in January 2019. Within three months, Featurespace and Contis completed deployment and training within Contis' existing fraud prevention...

Read more
Page 56 of 69 1 55 56 57 69