Eskenzi PR ad banner Eskenzi PR ad banner


The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Web Security Expert Troy Hunt To Be Welcomed Into The Infosecurity Hall Of Fame.

Australian web security expert Troy Hunt has been revealed as the latest industry luminary to be selected to join the Infosecurity Hall of Fame. He will be inducted into the Hall of Fame at Infosecurity Europe, Europe’s number one information security event. Troy’s inclusion in the Infosecurity Hall of Fame recognises his contribution to the advancement of information security, education and good practice as an industry advocate, through his security research, public education, blogging and...

Read more
Arcturus Becomes CHECK Accredited After Just One Year.

Cyber security specialist, Arcturus, has become one of the youngest companies to be listed as a CHECK service provider by the National Cyber Security Centre (NCSC), achieving the accreditation in just over a year since its incorporation. As a CHECK-accredited company, Arcturus is now accredited to perform IT Health Checks (ITHC) and assess IT systems for the government and other public sector organisations that store and handle classified and sensitive data or connect to the...

Read more

By Andre Stoorvogel, Director of Product Marketing, Rambus Payments The rapid expansion of the cryptocurrency ecosystem demonstrates the power of the blockchain to revolutionize financial services and beyond. Yet at the same time, the inherent volatility provides a cautionary tale. With blockchain implementations gaining traction, it is clear that a new approach is required to enhance the security and usability of crypto and digital assets. But how can this be achieved? A token gesture or...

Read more
nCipher: New Digital Initiatives, IoT And Cloud Adoption Driving The Use Of Trusted Cryptography Revealed By 2019 Global Encryption Trends Study.

nCipher Security, the provider of trust, integrity and control for business critical information and applications, announces that as organizations embrace the cloud and new digital initiatives such as the internet of things (IoT), blockchain and digital payments the use of trusted cryptography to protect their applications and sensitive information is at an all-time high, according to the 2019 Global Encryption Trends Study from the Ponemon Institute. With corporate data breaches making the headlines on an...

Read more
Threat Intelligence Group Completes Global Expansion.

Cyber security company Foregenix has expanded its Threat Intelligence Group (TIG) in the Asia-Pacific region with the establishment of a new base in Melbourne, Australia. The move will enable the Wiltshire headquartered firm, which has offices in Europe, Africa, SE Asia and North and South America as well as an established base in Sydney, to offer TIG services globally and around the clock in a follow-the-sun fashion. The TIG provides real-time endpoint monitoring in support...

Read more
Lack Of Skills Is Leading Cause Of The Information Security ‘Talent Gap’, According To Latest Infosecurity Europe Poll.

A lack of skills is cited as the biggest challenge to recruiting cyber and information security talent by almost a third (30 per cent) of respondents to a social media poll conducted by Infosecurity Europe 2019 – Europe’s number one information security event. This is followed by lack of recruitment budget (27 per cent) and lack of interest in careers within the sector (26 per cent). More than half (52 per cent) believe the skills...

Read more
GlobalPlatform And The Trusted Platform Association Collaborate On Trusted IoT.

GlobalPlatform, the standard for secure digital services and devices, has signed a memorandum of understanding (MoU) with the Trusted Platform Association, an organization which brings together Russian cybersecurity companies to create a collaborative internet of things (IoT) ecosystem that meets diverse market needs with flexible security. The joint work initiative will focus on aligning GlobalPlatform’s specifications, which standardize the secure management of digital services and devices, with existing Russian requirements and regulations. This harmonization of...

Read more
The Biometric Smart Card: Connecting The Digitally Excluded.

By Stan Swearingen, CEO of IDEX Biometrics Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m people in the UK lack the basic digital skills they need to use the internet effectively. And 4.8m people never...

Read more
Adrian Taylor

By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At the same time, DDoS attacks are on the rise, with Cisco estimating that the number of DDoS attacks exceeding 1 gigabit of traffic per second will soar to 3.1 million by 2021. While correlation does not equal causation, in this case I believe that the two are connected. There is indeed evidence to show that IoT devices are a common...

Read more
Things To Know Before Developing Intelligence Requirements.

Written by Mike Mimoso, Editorial Director, Flashpoint To state the obvious, proper intelligence requirements must be in place before data collection, analysis, and consumption of intel can happen. These requirements are critical because they enable an organisation to choose and prioritise its intelligence goals, determine what information it needs to collect and from what sources to achieve those goals, establish how it will process this information, and identify which dissemination methods are most appropriate for...

Read more
Page 64 of 71 1 63 64 65 71