Guinness World Record Advert Guinness World Record Advert

Guru's Picks

Beating ransomware – 6 issues to solve before it strikes

Being struck by ransomware has been compared to having a heart attack. It’s something that stalks everyone in theory and yet when it happens the shock of the experience is always a surprise. For the first seconds, minutes - and sometimes hours - organisations are on their own. It’s a moment of unexpected trauma which many organisations find paralysing, something attackers plan for. This makes the attack’s effects even worse. Eventually a growing number call...

Read more
Genuine HR emails using common phishing tricks trigger suspicions

They say hard work is one of the core tenets of success. But, while a strong work ethic can undoubtedly get the job done, the efficiency and experience to guide hard work can go a long way. After all, even if you're willing to work as hard as possible, it's not easy to tackle a new industry without understanding how things work. Otherwise, you'll be too preoccupied building a roadmap to notice your competitors leaving...

Read more
Author headshot

Passwords are the first line of defense when it comes to digital security. For most businesses, each employee is going to have at least one username and password that they need to remember. In many cases, there will be many. This is, of course, is in addition to all of their personal accounts and passwords which are sometimes used on the same device as their work accounts.   With this in mind, it should come as no surprise that somewhere between 20% and 50% of calls...

Read more
Author headshot

What is an IT Health Check (ITHC) An ITHC (IT Health Check) is a series of tests to ensure that your organisation is impenetrable to unauthorised persons. Specifically, organisations or individuals conduct an ITHC to confirm that they meet key requirements for PSN compliance. Direct from the ITHC supporting guidance: “Your ITHC should aim to provide assurance that your organisation’s external systems are protected from unauthorised access or change, and they do not provide an unauthorised entry...

Read more
Event promotion image

Due to the introduction of the EU Directive on Security of Network and Information Systems in 2016, cybersecurity measures are becoming increasingly important, especially for critical infrastructure such as electricity or water supply, or for large industrial companies. Our concise online conference will explore the ongoing technical challenges faced in securing critical infrastructure against potential cyber-attacks. Over one half-day, cybersecurity experts will share valuable knowledge and experiences, with a practical demonstration of solutions delivered by...

Read more

The skills gap in cybersecurity is a much-discussed problem in the industry. Diversity is another issue that employers and educational institutions are trying to tackle, but changes are somewhat slow to come. And as the economy moves further into the digital age, it was clear to see people need help changing their career. These were the premises that brought Lorna and Andrea, the co-founders of CAPSLOCK and both former university lecturers, to assemble a world-class...

Read more
computer chip

The recent cyber-attack against Oldsmar Water Plant in Florida has increased concerns over cybercriminals targeting industrial organisations and highlighted that the cyber-physical attacks that have been predicted for years, are now happening. In February this year, it was announced that cybercriminals had broken into the water plant and changed the level of sodium hydroxide being fed to people’s homes from 100 parts per million to 11,100 parts per million. It took over five hours for an...

Read more
edgescan logo

Supplier: Edgescan Website: www.edgescan.com Price: Based on assets Scores Performance 5/5 Features 5/5 Value for Money 4/5 Ease of Use 5/5 Overall 5/5 Verdict: Fullstack vulnerability management made easy - Edgescan does all the hard work so you don’t have to The pandemic has undoubtedly led to a massive surge in cyber-attacks but even as restrictions start to ease, businesses can’t afford to relax as these threats will keep evolving and continue long into the...

Read more
The clubhouse app

Global connectivity specialist Eseye and leading agentless device security platform provider Armis, today announced a strategic partnership and joint solution that enables organisations to deploy connected devices anywhere in the world with enterprise-class security and consistent, reliable cellular (4G/LTE/5G) connectivity.   Eseye’s unique Connectivity Management Platform enables devices to switch intelligently to any one of over 700 GSMA-compliant carriers to maximise uptime with greater than 98% global coverage. The Armis Agentless Device Security Platform provides...

Read more
Performanta acquires Identity Experts to bolster Microsoft IAM and security capabilities

Performanta, a fast-growing global provider of managed cyber security services to enterprise customers, today announced the acquisition of Identity Experts, a Microsoft Gold Security Partner and Identity & Access Management (IAM) specialist consultancy based in the UK. The move follows a significant investment round from Beech Tree Private Equity and will allow Performanta to extend important security capabilities further across the Microsoft portfolio – including Azure AD, Sentinel, ATP, O365 and IAM – that customers...

Read more
Page 1 of 14 1 2 14