Eskenzi PR ad banner Eskenzi PR ad banner

Guru's Picks

Zero Trust core to contemporary cybersecurity strategy, One Identity research finds

One Identity, the unified identity security company, has released global survey findings that unpack the current state of Zero Trust awareness and adoption across the enterprise. After a year plagued by one disastrous cybersecurity incident after another, new findings from One Identity reveal that only 1 in 5 security stakeholders are confident in their organisation's understanding of Zero Trust. According to the Dimensional Research-conducted survey of 1,009 IT security professionals, Zero Trust is a main...

Read more
One Identity Offers Free Privileged Session Management Capability to Support Critical Infrastructure Providers

On Tuesday, energy generator CS Energy, which is owned by the Queensland government, fell victim to a ransomware attack that impacted operations. The incident occurred over the weekend, in yet the latest cyber threat to target critical infrastructure. As per the organisation's announcement, the incident occurred on CS Energy’s corporate network and has not impacted electricity generation at our Callide and Kogan Creek power stations. Our power stations are continuing to generate and dispatch electricity...

Read more
Managing chaos: How 9/11 and the pandemic changed the way organisations understand critical events

Most careers might take an unexpected turn from time to time but very few people see the path of their entire professional existence re-wired, without warning, in a single morning.   One who did is Tracy Reinhold, now the chief security officer at critical event management company Everbridge, which has been described as the most successful security company nobody has heard of.   The morning was September 11, 2001, probably the first time in world history when a billion human beings alive at the time will be able to say without hesitation what they were doing on a single day. Most of us remember very little but this was an unwanted reminder that there are a few things about...

Read more

PICCASO - which stands for "Privacy, InfoSec, Culture Change & Awareness Societal Organisation" - is a Special Interest Group (SIG) founded by CEO Steve Wright at Privacy Culture Limited June 2021,  with the driving purpose of opening conversations about why and how a culture of privacy should be embedded into organisations and be at the heart of privacy compliance & strategy. By discussing specialised privacy topics such as Culture, Behaviour, Change & Communication, and looking...

Read more
Beating ransomware – 6 issues to solve before it strikes

Being struck by ransomware has been compared to having a heart attack. It’s something that stalks everyone in theory and yet when it happens the shock of the experience is always a surprise. For the first seconds, minutes - and sometimes hours - organisations are on their own. It’s a moment of unexpected trauma which many organisations find paralysing, something attackers plan for. This makes the attack’s effects even worse. Eventually a growing number call...

Read more
Genuine HR emails using common phishing tricks trigger suspicions

They say hard work is one of the core tenets of success. But, while a strong work ethic can undoubtedly get the job done, the efficiency and experience to guide hard work can go a long way. After all, even if you're willing to work as hard as possible, it's not easy to tackle a new industry without understanding how things work. Otherwise, you'll be too preoccupied building a roadmap to notice your competitors leaving...

Read more
Author headshot

Passwords are the first line of defense when it comes to digital security. For most businesses, each employee is going to have at least one username and password that they need to remember. In many cases, there will be many. This is, of course, is in addition to all of their personal accounts and passwords which are sometimes used on the same device as their work accounts.   With this in mind, it should come as no surprise that somewhere between 20% and 50% of calls...

Read more
Author headshot

What is an IT Health Check (ITHC) An ITHC (IT Health Check) is a series of tests to ensure that your organisation is impenetrable to unauthorised persons. Specifically, organisations or individuals conduct an ITHC to confirm that they meet key requirements for PSN compliance. Direct from the ITHC supporting guidance: “Your ITHC should aim to provide assurance that your organisation’s external systems are protected from unauthorised access or change, and they do not provide an unauthorised entry...

Read more
Event promotion image

Due to the introduction of the EU Directive on Security of Network and Information Systems in 2016, cybersecurity measures are becoming increasingly important, especially for critical infrastructure such as electricity or water supply, or for large industrial companies. Our concise online conference will explore the ongoing technical challenges faced in securing critical infrastructure against potential cyber-attacks. Over one half-day, cybersecurity experts will share valuable knowledge and experiences, with a practical demonstration of solutions delivered by...

Read more

The skills gap in cybersecurity is a much-discussed problem in the industry. Diversity is another issue that employers and educational institutions are trying to tackle, but changes are somewhat slow to come. And as the economy moves further into the digital age, it was clear to see people need help changing their career. These were the premises that brought Lorna and Andrea, the co-founders of CAPSLOCK and both former university lecturers, to assemble a world-class...

Read more
Page 1 of 14 1 2 14