Eskenzi PR ad banner Eskenzi PR ad banner

Features

Why is cybersecurity vital for small businesses?

Picture the scene: The office of a small but successful law firm is broken into. During the ensuing break-in, hundreds of documents relating to both employees’ and clients’ personal data are stolen and presumed available for sale online, including compromising personal information and financial data. Following an investigation, it becomes apparent that the law firm did not employ basic security controls when attempting to protect their physical premises. No security system, no CCTV, and no...

Read more
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Outpost24’s Blueliv Labs has announced it has found the infamous TA505 threat actor has resurfaced with a new dangerous RAT variant - named GraceWrapper by Outpost24’s threat researchers. TA505 is a financially motivated threat actor group believed to have been operating for almost a decade. In more recent years, it is believed that the group is responsible for operating the Clop ransomware after compromising corporate networks by using a variety of remote administration malware such as SDBbot, FlawedAmmy...

Read more
In conversation with Chris Roberts, Business Development Manager at Fortinet

At the inaugural International Cyber Expo, The Guru team got the opportunity to chat with Chris Roberts, Business Development at Fortinet to better understand how the cybersecurity industry is using automation, whether there will come a point where human intervention is needed as well as hearing how it is helping security teams during the current skills shortage.   For Roberts, automation has helped the cybersecurity industry immensely, both in terms of the technology and solutions that have...

Read more
The Nation State Threat — Philip Ingram Discusses DDoS and the Possibilities of Cyberwar

Speaking at International Cyber Expo, Philip Ingram shared that the concept of “cyber war” is nothing new. He cites World War One as one of the earliest notable examples—in which the United Kingdom cut Germany’s transatlantic cables. This action forced the German High Command to switch its communication line to a different cable, which the United Kingdom was listening in to, taking advantage of this rerouting in order to intercept the Zimmerman Telegram, and ultimately...

Read more
Finding the Sunshine in Cyber – In conversation with Stuart Avery

The Guru was lucky enough to sit down with Stuart Avery, Business Development Specialist at e2e-assure, at the inaugural International Cyber Expo to discuss key trends, how and why everyone should get involved in cyber, and the industry’s image problem.  According to Avery, cybersecurity has undergone a change over the past few years. The rise of zero trust and identity management has forced cyber-pros to secure the user, not the network.  “It used to be...

Read more

Open source has always been the epitome of security, and this is now more so the case than ever due to the recent influx of software like open source analysis. However, it is still natural for people to have their doubts, and it would be misleading to say that using open source components is always safe one hundred percent of the time.  Luckily, there are a few ways for us to gauge the security of...

Read more
Over reliance on shift-left can lead us in the wrong direction

The modern tech landscape is all about speed. In the great race to innovate, developers have been pushed to create and update applications at a hitherto unimaginable rate. As the bar is raised ever higher, and businesses scramble to keep up or get ahead, developers must build code faster than ever to speed development cycles.  The “shift-left” security movement grew out of this phenomenon. In order to save on human resources, cut costs and slash...

Read more
In conversation with Jamie Akhtar, CEO and co-founder of CyberSmart

Jamie Akhtar, aside from being the CEO and co-founder of CyberSmart, is a veritable titan of the cybersecurity industry. From cutting his teeth in New York serving as CTO for investment firms and gaming companies, to turning his attention to the underdogs, Jamie has a refreshing and unique take on the industry at large.  Can you tell me a bit about you and your background? I’ve been obsessed with technology for as long as I...

Read more

Written by Chris Roberts, Fortinet We face an exciting evolution in the cybersecurity sector.  Attackers are becoming both more efficient and intelligent at evaluating their targets and successfully carrying out their intended campaigns. Often money is at the forefront of their minds but, as we have seen recently, drivers may also be geo-political or activist views. Whatever their motivations, financial or otherwise, their methods continue to be both immoral and, in most jurisdictions, illegal. Understanding...

Read more
MIRACL is One Cybersecurity Company to Watch in 2022

Passwords are traditional. As long as only you and the people you trust know them then, you can operate anonymously and with security on the Internet and various applications. Passwords are safe. Well not really. Not anymore.     Passwords are reused. They are successful for months, years even. Yet, the reliance on a singular method of authentication is foolhardy. If something can go wrong, it will. Eventually, a data breach reveals a password and it...

Read more
Page 7 of 15 1 6 7 8 15