Eskenzi PR ad banner Eskenzi PR ad banner

Features

AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Europe’s Top Insurance Providers have been found to have security weaknesses within their web application architecture, according to the latest research by Outpost24. The 2021 Web Application Security for Insurers Report analysed the web applications of the top 10 European insurance providers, as listed by ADV Rating, and found that every insurer had some degree of vulnerability or security weakness. In fact, it was discovered that the top EU insurers run a total of 7,611 internet exposed web applications over 1,920 domains, with 3% of them considered suspicious (e.g. testing...

Read more
Author headshot

What is an IT Health Check (ITHC) An ITHC (IT Health Check) is a series of tests to ensure that your organisation is impenetrable to unauthorised persons. Specifically, organisations or individuals conduct an ITHC to confirm that they meet key requirements for PSN compliance. Direct from the ITHC supporting guidance: “Your ITHC should aim to provide assurance that your organisation’s external systems are protected from unauthorised access or change, and they do not provide an unauthorised entry...

Read more
European Cybersecurity Blogger Awards 2021 Open for Nominations

The European Cybersecurity Blogger Awards has returned in 2021 to recognise the best blogs and podcasts in the cybersecurity industry, as voted by themselves or peers and judged by a panel of experts. Nominations have now opened until the 14th of May.  The winners will be revealed during a virtual meet-up event on Tuesday, 9th of June.   This year will see the eighth European Cyber Security Blogger Awards hosted by Eskenzi PR and sponsored...

Read more
Entersekt releases findings from State of Online Shopping Report UK

Entersekt has released results of its State of Online Shopping Report that examined the shopping habits of 1000 UK consumers since the start of the COVID-19 pandemic. Carried out by Censuswide and completed on the 6th November 2020, the study looked at consumers’ shopping behaviours, priorities when shopping online, how they make their decisions on where to shop online as well as their attitudes towards security and fraud.   The report gives retailers and Financial...

Read more
code

Gender diversity in the security industry is improving. According to the latest ISC(2) figures, the percentage of women in cybersecurity is around 24 percent, with an increasing number being appointed in leadership positions. It is widely agreed that one of the most important factors in encouraging more women to enter the industry in the first place — or, indeed to make a career switch over to cybersecurity — is the existence of role models. The...

Read more
Securonix

As workplaces are becoming more remote, with almost half of the workforce working from home, and an introduction of bring your own device policies in many organisations, endpoints have become more distributed and cyberattacks even more prevalent. Remote workforces are creating more vulnerabilities for endpoints as they are no longer located in secure networks, making endpoints an increasingly critical vector for advance threats in dire need of protection. Secureonix has recently announced an integration with...

Read more
Women in cyber – diverse talents and the barriers to acceptance

Three women at BAE Systems Applied Intelligence, exemplify some of the various opportunities for women in cyber, with diverse backgrounds, skillsets and routes into the sector ranging from programmer to comms, or transitioning from social science to threat intel. Using their own experiences of progressing in a male-dominated sector, they explain their role, the challenges and consider what changes could redress the underrepresentation of women in cyber. Mivy James, Head of Consulting at BAE Systems...

Read more
Strategies for overcoming male domination in cyber

People come into cyber security from a wide range of backgrounds, but the usual image is of a core cadre of techies depicted as having progressed from being boys in bedrooms hacking into games –  but that’s not true, rather, it was only ever part of the picture, with women also involved in every step of the nascent cyber security industry. Joan D Pepin, Chief Security Officer at AuthO is a great example. She explains...

Read more
Tweet Chat: Exploring the hidden world of Shadow Code

In the latest IT Security Guru Tweet chat, we were joined by PerimeterX, a leading voice in the world of application security, and a host of other voices from across the Infosec spectrum: Analysts, technical experts, members of the C-suite and professional bodies came together to discuss the emergence of shadow code, a new term to describe the use of third-party scripts in applications, without authorisation or safety validation. Our assembled influencers came ready to...

Read more
Cybersecurity

According to Synopsys' BSIMM11 Study, there are some key trends to take note of when it comes to software security practices. Firstly, it shows that CI/CD instrumentation and operations orchestration have become standard components of many businesses’ software security initiatives, influencing how they are organised, designed and executed. For example, software security teams are beginning to report into a technology team or CTO instead of reporting to an IT security team or CISO. Additionally, they...

Read more
Page 14 of 15 1 13 14 15