Eskenzi PR ad banner Eskenzi PR ad banner

Features

green and white slide with logo and photo

Every day, countless people across all industries send and receive emails as a significant part of their jobs. Email is often the most convenient and simplest way to get keep in contact with key stakeholders such as co-workers, senior management, and clients, and many don’t give it a second thought. However, the state of email security is rife with risks. It is vital that people in all industries and at all levels are informed on...

Read more
New Research Highlights Increased Security Risks Posed by Remote Working and BYOD

Lookout Inc. have announced the release of Lookout Mobile Endpoint Security, a mobile endpoint detection and response (EDR) offering for managed security service providers (MSSPs). This solution enables MSSPs to deliver a complete turn-key program for identifying risk, protecting sensitive data and securing their customers' mobile devices. With Lookout’s Mobile EDR, MSSPs can help organisations reduce the risk of a data breach through mobile phishing, ransomware and exploitation of device and app vulnerabilities. While businesses...

Read more
Ransomware on Healthcare Organisations cost Global Economy $92 bn

Comparitech recently conducted a series of freedom-of-information requests, which found that UK government employees received an average of 2,246 malicious emails each in 2022. The results showed that, across 250 government organisations, Comparitech estimates that 2.16 million government employees received a total of 2.75 billion malicious emails in 2022. The study also found that: Government employees received an average of 2,245.88 malicious emails each in 2022 250 government organisations received an estimated 2.75 billion malicious...

Read more
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Today, Cato Networks has been named the Leader in the Single-Vendor SASE Quadrant Analysis published in TechTarget. "We're honoured to be identified as the Leader in single-vendor SASE market," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Cato introduced the first worldwide SASE platform in 2016, four years before Gartner defined the term. Since then, we've continued to enhance and extend Cato SASE Cloud as recognized by this award." Why Single-Vendor SASE? While SASE brings...

Read more
Blue Logo OUTPOST24

Today, Outpost24 released a new report revealing the underground operation of Traffers, cybercriminal organisations reshaping the business of stolen credentials. The Rising Threat of Traffers report, compiled by Outpost24’s Threat Intelligence team, KrakenLabs, provides a deep dive into the credential theft ecosystem, and encourages organisations to evaluate their security measures against these evolving threats. Stolen credentials are a major problem for organisations, causing nearly 50% of all data breaches. While businesses are still trying to...

Read more
Blue logo, capitalised letters. SPECOPS.

New research released by Specops Software outlines the most common Fortune 500 company names that show up in compromised password data. The Specops research team analysed an 800 million password subset of the larger Breached Password Protection database to obtain these results. Among the top ten, popular household names like Coca-Cola (16,710 appearances), Starbucks (3,800 appearances) and McDonald’s (2,270 times) appear. The most common Fortune 500 company to have been found among passwords in the subset...

Read more
New AT&T Cybersecurity USM Anywhere Advisors Service Helps to Establish and Maintain Threat Detection and Response Effectiveness

When you think of cybersecurity threats, what comes to mind? If you pictured faceless criminals (or a team of them) in a dimly-lit headquarters working tirelessly to steal your most precious digital assets, you’re not alone. Yet, cybercrime doesn’t always look like a scene from a Hollywood movie.   Sometimes, cyber threats are closer to home, making them all the more surprising (and frustrating) for many organizations. They’re called insider threats, and you need to...

Read more
Blue logo, capitalised letters. SPECOPS.

Password management and user authentication solutions provider Specops Software has today announced the release of its annual Weak Password Report which analysed over 800 million breached passwords and suggests that passwords continue to be a weak spot in an organisation's network. The study found 88% of passwords used in successful attacks consisted of 12 characters or less, with the most common being 8 characters (24%).  The most common base terms used in passwords were: ‘password’,...

Read more
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Mobile phishing is an issue plaguing the masses and a growing concern for enterprises, particularly as  2022 had the highest percentage of mobile phishing encounter rates ever, according to Lookout's Global State of Mobile Phishing report. On average, more than 30% of personal and enterprise users exposed to these attacks every quarter. In the U.K., there was a 35% increase in the average number of mobile devices exposed to at least one malicious phishing attack...

Read more
Phyron teams up with konversable

Leading AI car video technology supplier, Phyron AI and chat technology provider, konversable have announced a new partnership designed to maximise sales of used cars for retailers. The partnership allows for a WhatsApp Enquiry option to be embedded into Phyron’s AI-generated used car videos, so that a customer can quickly engage with a car they are interested in and instantly start chatting with the dealer over the UK’s most popular messaging app. Speaking of the...

Read more
Page 5 of 15 1 4 5 6 15