Eskenzi PR Eskenzi PR

Insight

Auto Draft

Our latest research into consumer behaviour has unearthed a conundrum: people knowingly take risks online even though they understand the dangers. On the one hand, we’ve got two out of three saying life is riskier now than it was five years ago, with serious concerns about losing data or being hacked. But on the other hand, one third of people are still neglecting basic cybersecurity hygiene. Consumers seem somehow unable or unwilling to protect themselves....

Read more
Stock Credit

A report released this week by Outpost24, that examined the security posture of web applications amongst the Top 10 US Credit Unions, has revealed that they all have security issues. Using Outpost24’s attack surface discovery tool called Scout, Outpost24 was able to analyse each Credit Union’s public-facing web security environments against the seven most common attack vectors used by hackers during reconnaissance, to ascertain a risk score that is measured 1-100. The attack vectors are labelled as...

Read more
open source

Q1/21 a symposium was hosted in the US under the title ‘Thinking Outside the SCIF’ (Sensitive Compartmented Information Facility) to put forward the case for the utilisation of OSINT (Open Source) within the US Military and Intelligence Communities. John McLaughlin (CIA) kicked off day one by correctly pointing out that there was nothing new about open-source (OSINT), and paid tribute to how, in the conditions of the Pandemic, the utilisation of OSINT methodologies within the...

Read more
Just What Does It Take to Develop a Career in the Cybersecurity Domain?

Many organisations that are turning to DevOps are struggling with various security challenges along the way. In “The Ultimate Guide of Orchestrating Security and DevOps,” tracing those obstacles to a lingering “cultural conflict” between the developers and security teams. Security teams are struggling to keep up with the pace that DevOps teams are used to, for instance, while DevOps teams are culturally resistant to anything like security and testing that could potentially disrupt their work...

Read more
A battle cry for SMBs to address cybersecurity

When we read about cyberattacks in the news, they typically involve a well-known brand or large enterprise. The perception is the bigger the organization, the greater the impact. However, the recent attack on Microsoft Exchange Servers is expected to impact over 60,000 organisations. Indeed, this is likely to be higher given that recent research has found more than 10 different advanced persistent threat (APT) groups are exploiting the Microsoft Exchange vulnerabilities. The worst part, however,...

Read more
Crypto currency being held in a hand

By Chris Sedgwick, director of security operations at Talion Cryptocurrencies are a topic that touches many areas; not only finance and investing but technology and even political arenas. Although apolitical in itself, it is the structure behind these cryptocurrencies that make them a much talked about subject amongst political purists from across the political spectrum. This structure can be boiled down to the following; think of cryptocurrencies as a ‘big spreadsheet’, and when you ‘mine’...

Read more
Why are you ignoring NIST, NSA and the NCSC?

Between August 2020 and February 2021, “the agencies”, National Institute of Standards and Technology (NIST), National Security Agency (NSA) and National Cyber Security Centre (NCSC) had all published final or preliminary (beta) guidance for Zero Trust (ZT) that is applicable to all sizes of organisations. I would suggest to you that the agencies are experts in the field of cybersecurity. So why are these being ignored by vendors, analysts and consultancies to promote products and...

Read more
DevSecOps as a culture – What you need to know

RosRed orange. Lemon yellow. #ff4500. #6699cc. Whether using pigment or light, when it comes to creating colours, the second word in the colour is the primary colour, and the first word is the descriptor. In “red orange,” it’s an orange colour with red; “#6699cc” is a grey with blue added. It’s the same idea when talking about culture. For “DevSecOps culture,” culture is the primary word and DevSecOps describes that culture. I'm going to talk...

Read more
Claire headshot

The events of 2020 from a cybersecurity perspective have brought to light the significance of diversity for businesses of all sizes. Facing a more diverse range of challenges than most will have experienced before required an equally diverse range of coping mechanisms and responses to navigate accelerated digital transitions. The move to remote working placed strain on communications, data sharing, client management and – underpinning it all – security. Yet, while many are all too...

Read more
Remote Working Security Survival Guide

In the last year, the vast majority of us were compelled to reimagine the conventional office space; transforming dining room tables and ironing boards into desks, and sofas into our go-to spot for conference calls. Like dominoes, one company after another has announced their intention to adopt long-term, or permanent, remote working.   There are, undoubtedly, a great number of benefits arising from this transition for both employers and employees alike. On one hand, employees can...

Read more
Page 1 of 8 1 2 8