Eskenzi PR ad banner Eskenzi PR ad banner

Features

Genuine HR emails using common phishing tricks trigger suspicions

They say hard work is one of the core tenets of success. But, while a strong work ethic can undoubtedly get the job done, the efficiency and experience to guide hard work can go a long way. After all, even if you're willing to work as hard as possible, it's not easy to tackle a new industry without understanding how things work. Otherwise, you'll be too preoccupied building a roadmap to notice your competitors leaving...

Read more
Author headshot

Hackers are using weak and stolen credentials in a significant way to compromise business-critical environments. Stealing access to your environment using a known password for a user account is a much easier way to compromise systems than relying on other vulnerabilities. Therefore, using good password security and robust password policies is an excellent way for organizations to bolster their cybersecurity posture. What characteristics make up an effective password policy? Developing an effective reporting structure for...

Read more
Authlogics announces enhancements to its Password Security Management Product

Authlogics has announced the latest enhancements to its dynamic Password Security Management (PSM) product. The new features will help enterprises ‘level up’ their password policies in order to ensure heightened security. Instead of traditional costly policies which encourage users to change their passwords at regular intervals, PSM will bridge the gap between a fixed expiry date and the NIST guidance to never expire by allowing for a sliding scale. Simply put, the longer a password is,...

Read more
Tripwire

Of the 73% of security professionals with responsibility for the security of public cloud who operate in a multi-cloud environment, 98% think these more complex environments pose greater security challenges, a survey conducted for Tripwire by Dimensional Research reveals.   Organizations have a wide range of reasons for going multi-cloud, including meeting varying business needs, running certain applications, distributing risk, taking advantage of cost savings, and to provide redundancy in the event of downtime. In the industrial space specifically,...

Read more
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Europe’s Top Insurance Providers have been found to have security weaknesses within their web application architecture, according to the latest research by Outpost24. The 2021 Web Application Security for Insurers Report analysed the web applications of the top 10 European insurance providers, as listed by ADV Rating, and found that every insurer had some degree of vulnerability or security weakness. In fact, it was discovered that the top EU insurers run a total of 7,611 internet exposed web applications over 1,920 domains, with 3% of them considered suspicious (e.g. testing...

Read more
Author headshot

What is an IT Health Check (ITHC) An ITHC (IT Health Check) is a series of tests to ensure that your organisation is impenetrable to unauthorised persons. Specifically, organisations or individuals conduct an ITHC to confirm that they meet key requirements for PSN compliance. Direct from the ITHC supporting guidance: “Your ITHC should aim to provide assurance that your organisation’s external systems are protected from unauthorised access or change, and they do not provide an unauthorised entry...

Read more
European Cybersecurity Blogger Awards 2021 Open for Nominations

The European Cybersecurity Blogger Awards has returned in 2021 to recognise the best blogs and podcasts in the cybersecurity industry, as voted by themselves or peers and judged by a panel of experts. Nominations have now opened until the 14th of May.  The winners will be revealed during a virtual meet-up event on Tuesday, 9th of June.   This year will see the eighth European Cyber Security Blogger Awards hosted by Eskenzi PR and sponsored...

Read more
Entersekt releases findings from State of Online Shopping Report UK

Entersekt has released results of its State of Online Shopping Report that examined the shopping habits of 1000 UK consumers since the start of the COVID-19 pandemic. Carried out by Censuswide and completed on the 6th November 2020, the study looked at consumers’ shopping behaviours, priorities when shopping online, how they make their decisions on where to shop online as well as their attitudes towards security and fraud.   The report gives retailers and Financial...

Read more
code

Gender diversity in the security industry is improving. According to the latest ISC(2) figures, the percentage of women in cybersecurity is around 24 percent, with an increasing number being appointed in leadership positions. It is widely agreed that one of the most important factors in encouraging more women to enter the industry in the first place — or, indeed to make a career switch over to cybersecurity — is the existence of role models. The...

Read more
Securonix

As workplaces are becoming more remote, with almost half of the workforce working from home, and an introduction of bring your own device policies in many organisations, endpoints have become more distributed and cyberattacks even more prevalent. Remote workforces are creating more vulnerabilities for endpoints as they are no longer located in secure networks, making endpoints an increasingly critical vector for advance threats in dire need of protection. Secureonix has recently announced an integration with...

Read more
Page 14 of 15 1 13 14 15