DTX Manchester DTX Manchester

Guru's Picks

health

NHS Management provides administrative and consulting services for over 50 individual healthcare facilities and companies across four states in the US southeast region. Naturally, quality of care is the number one priority, as is protecting patient data in such a highly regulated environment and no compromises between the two can be made. Stephen Locke, CIO for NHS Management explained: “There are a lot of unique challenges in healthcare when it comes to cybersecurity, particularly with...

Read more
Holiday phishing scam surge aimed at small business

‘Twas the night before Christmas, and fresh off the LAN The packets were coming fast out of the span. My wireshark was up with my templates in place, In hopes that I’d find an IP I could trace. The smart home was snug in its /28 With a meager allow-list, and a lock on the gate. With a few hours to setup and wrap this year’s catches I’d been charging them up, and applying their...

Read more
Organisations May Fail to Prepare Employees for Cybersecurity Threats

A recent survey conducted on behalf of KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has found that of a thousand recently furloughed employees, 41% admitted that their company had never offered them a security awareness training course, while 14% have gone as far as to say that their employer has not taken security seriously enough.   While a quarter of organisations did implement added security measures such as...

Read more
AT&T Cybersecurity Insights Report: Fewer than 10% of security professionals feel prepared for 5G rollout

The dawn of 5G technology is upon us and this new wireless power promises to be a superior successor to 4G networks. With more devices connecting to more data, both enterprises and the general consumer will greatly benefit from 5G’s arrival. But how ready are businesses for this new era in connectivity and how secure is 5G?   AT&T Cybersecurity has just released its tenth Cybersecurity Insights Report: 5G and the Journey to the Edge,...

Read more
A Guide to Kubernetes Security

Organizations are bringing a variety of new technologies into their IT infrastructure as they continue to undergo their digital transformations. Many are embracing containers and Kubernetes, in particular. In a 2020 report, for instance, 56% of surveyed organizations expected their use of containers to increase within the next 12 months, wrote The Enterprisers Project. Another survey referenced in the same report found that more than three quarters (78%) of participating organizations were using Kubernetes in...

Read more
Security Serious Unsung Heroes Awards 2020 Winners Announced

The fifth annual Security Serious Unsung Heroes Awards winners were revealed last night during a socially distanced virtual awards ceremony. The awards celebrate the people, not products, of the cybersecurity industry. From the best ethical hackers and cybersecurity’s rising stars to the best security awareness campaign and the coveted Godparent of Security, the categories recognise individuals and teams working hard to protect Britain from cybercrime while raising awareness of security issues.        The free event was a chance for the UK cybersecurity industry to come together, catch up with familiar faces and...

Read more
Security lock and chain on gate

By Trevor J Morgan, product manager at comforte AG The cloud is an incredibly useful tool for businesses and enterprises that process huge amounts of information. Over recent years, cloud adoption has increased substantially. Indeed, the public cloud service market is expected to reach $623.3 billion by 2023 worldwide as more businesses look to expand operations but lack the tools or resources to deploy inhouse cloud operations. This is especially true for enterprises that process...

Read more
Tweet Chat Twitter Bird

We are now more than halfway through the year, and what a crazy half it has been, both in terms of the global pandemic but also when you consider the volatile climate that the cybersecurity industry finds itself in. We wanted to find out what trends had been seen, how organisations should go about ensuring security is being kept as a priority, the impact Covid-19 will have and the importance of having a strong security...

Read more
Lookout! Total App Defence is Here

It is common practice for businesses to implement some kind of central tool to manage smartphones and tablets. Normally, this is done through solutions referred to as mobile device management (MDM), which can ensure mobile devices are configured properly for business use. MDMs can also be used to mandate certain built-in device security settings, such as device lock-screen and pin code length. It would be a mistake, however, to assume that this provides adequate enterprise-grade...

Read more
edgescan logo

Edgescan's Senior Security Consultant Guram Javakhishvili has discovered several vulnerabilities across a number of popular applications. Some of these are not yet publicly available. As soon as the vendor implements the fixes, those issues will also be added to this list and article will be updated accordingly. CMS Made Simple 2.2.13 CMS Made Simple is a Content Management System that was first released in July 2004 as an open source General Public License (GPL) package....

Read more
Page 1 of 12 1 2 12