Eskenzi PR ad banner Eskenzi PR ad banner

Guru's Picks

Cyber Security Connect UK

Cyber Security Connect UK (CSC UK), the leading exclusive conference and industry forum for chief information security officers (CISOs) kicks off today (13th November) and runs until 15th November in Monaco. This second edition event will see more than 200 of the UK's top CISOs selected from a range of industries including finance, retail and legal, as well as representatives from government bodies gather to discuss the most current cand challenging cybersecurity trends. The exclusive annual event is...

Read more
Dr Leila Powell, Lead Security Data Scientist, Panaseer

As a data scientist I cannot solve business problems if appropriate data is not available. However, this is the situation faced by security leaders on a daily basis – they have to make strategic decisions, which will impact their cyber security posture, without having access to the  insights they need. How can they overcome the twin challenges of a lack of visibility (not enough of the right information) and a lack of confidence (untrusted information)?...

Read more
Windows XP

It may be hard to remember today, but when Windows XP was released on Oct. 25, 2001, it was a revelation. Aimed at both consumers and businesses, it married a user-friendly interface with reliability, replacing clunky and crash-prone Windows 2000. When upgrades to the system became available in the ensuing years, many businesses and individuals decided they had sunk too much time and money into XP-compatible hardware and training to make switching worthwhile. In fact,...

Read more
Reeses_Peanut_Butter_Cup

With Halloween fast approaching, it’s a great time to discuss some of our favourite things in life: the creation of chocolate peanut butter cups and what these can teach us about phishing. Hard to imagine a time when before the “age of the cup” because there are many that never got to know the delicious glory that accompanies the unification of chocolate and peanut butter. Prior to that time, people walked around in total ignorance...

Read more
Partnership teamwork

OneLogin, an industry leading provider of Unified Access Management (UAM), has partnered with Prianto UK to facilitate the distribution of its services in the UK. This collaboration will enable Prianto and OneLogin to fulfill their joint commitment of providing a secure, seamless experience for end-users and administrators alike. This collaboration brings together a company specialising in the distribution of software and SaaS, and what Yuri Pasea, CEO of Prianto UK, calls: “one of the leading security companies...

Read more
I think therefore IAM

“I think therefore I am.” - René Descartes This isn’t just a pompous philosophical proposition of autonomy, instead it is a timely piece of advice for ensuring corporate cybersecurity. Descartes really was ahead of his time! Identity and access management (IAM) plays an important part in securing your IT infrastructure by mitigating risk from both external cyberattack, and internal threat. Any company that thinks seriously about protecting sensitive information about their employees or customers should...

Read more
insider threat

At the 2019 RSA Conference, a survey of 650 IT professionals revealed that 75% feel vulnerable to insider threat. This information from industry experts proves that there is dichotomy in the perception of cyberthreat across the media and IT professionals. This marks a significant shift from the frequent headlines warning of external cyberattacks that frequently occur in news sources and proves the critical nature of internal threat. Indeed, the individuals surveyed, ranked user errors (39%)...

Read more
Page 10 of 15 1 9 10 11 15