Eskenzi PR ad banner Eskenzi PR ad banner

Guru's Picks

Why Security Communication Matters More Than Ever.

Ellie Hurst, Head of Marketing Communication and Media at Advent-IM and a finalist in the Cyber Writer category in the Security Serious Unsung Heroes Awards 2019. I joined the security industry a little over eight years ago and my role is Head of Marketing, Media and Communications for an independent holistic security consultancy. Working in a communications type role, means one gets to see a very wide variety of business challenges. Working in a communications...

Read more
robot at computer

Luke Irwin, Copywriter at GRC International Group Plc and a finalist in the Cyber Writer category in the Security Serious Unsung Heroes Awards 2019. The hospitality sector has been clamouring for technological innovation recently, with organisations eager to find novel ways to improve the customer experience. You might have heard about Connie, a Watson-enabled robot concierge that’s been introduced at the Hilton in McLean, Virginia. But that’s just one example of cutting-edge technology sweeping the...

Read more
Fortune Favours The Bold.

By: Lisa Ventura, CEO & Founder, UK Cyber Security Association and a finalist in the Security Leader/ Mentor in the Security Serious Unsung Heroes Awards 2019I have been in the cyber security industry for over ten years, and my career did not go in a straightforward linear line. It has had many twists and turns, false starts and failures but one thing is certain – I never gave up. Everything I’ve been through over the...

Read more
ransomware

The debate as to whether ransomware should be paid or not has been a bone of contention for many years. We all know that rewarding criminal behaviour is a bad idea, but when stakes are high, it can be difficult to take the high road. And cybercriminals seem to be capitalising on these grey areas. According to recent research by AT&T Cybersecurity, 58% of IT security professionals would refuse to pay following a ransomware attack,...

Read more
10 Steps To Get Started In Cybersecurity Careers: What High-Achievers Do While Others Don’t.

By: Emin Caliskan, Cybersecurity Trainer, Career Mentor and a finalist in the Security Leader/Mentor category in the Security Serious Unsung Heroes Awards 2019. When it comes to cybersecurity skills shortage discussions, I genuinely admire our colleagues & academics when they advise "companies" to stop looking for best-of-the-best and give opportunities to job seekers (internship, entry-level position etc.) But here's the blunt truth: that's NOT going to happen. I am sorry to say this, especially for...

Read more
Modernising Identity For On-Prem Apps.

By Michael Gleason, director of product marketing at OneLogin Fun fact: in 2006, Forrester Research estimated that 90 percent of CRM sales were on-premises instances. That means ninety percent of CRM users had to deal with more than just a messy customer database - they had to deal with the hosting, the humans and the hardware necessary to host the application. In 2006, Salesforce.com’s trailing twelve month revenue wasn’t anything to scoff at - it...

Read more
Gurucul

A survey carried out this month by Gurucul, a security and fraud analytics technology provider, among 476 IT workers found that a quarter of people spend more than 2 hours a day surfing the web at work, equating to 10 hours a week and a mind-blowing 40 hours a month. In total, that means a quarter of all workers are wasting 3 months a year on non-work related surfing and, when you take the average...

Read more
Cyber security tools protection

Written by John Czupak, CEO, ThreatQuotient There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security Orchestration, Automation and Response (SOAR), Threat Intelligence Platforms (TIPs), Security Incident Response (SIR), Hunting and more). Unfortunately, many of us are equally confused about the fundamental capabilities of these technologies, and more pointedly, what problems they aim to solve. Perhaps...

Read more
Securonix Announces Network Traffic Analysis Product Offering.

Securonix, Inc., a leader in next-gen SIEM, today announced the launch of its network traffic analysis (NTA) product that will provide bundled Corelight network sensors and use case content. Securonix NTA will be an integral part of the Securonix SIEM product, enabling customers to deploy a single solution that correlates network traffic, security events, and entity context to detect and respond to the most advanced insider and cyber threats. Customers today are struggling to detect...

Read more
Securonix Enhances SIEM Platform With Analytics-Driven SOAR 2.0.

Securonix, Inc., the leader in Next-Gen SIEM, today announced the general availability of its SOAR 2.0 product. With integrated SIEM, UEBA, and SOAR capabilities, the Securonix Next-Gen SIEM platform provides end-to-end threat detection, investigation, and response enabling customers to significantly reduce their mean time to respond (MTTR) and improve operational efficiency. “Our vision is to provide customers with an end-to-end analytics platform to rapidly detect and respond to advanced threats,” said Tanuj Gulati, CTO and...

Read more
Page 13 of 15 1 12 13 14 15