Eskenzi PR ad banner Eskenzi PR ad banner

Insight

No time to dwell

Whether it is a burglar in your home or a hacker in your network, if you can limit the time before they are spotted and stopped in their tracks, you might prevent them from achieving their goal.   So, if we can lower cyber dwell times, also known as meantime-to-detect (MTTD), mean-time-to-respond (MTTR), or a combination of both, it should help in reducing the impact of cyber crime. But while lowering cyber threat dwell times...

Read more
data-security-analyst

The goal of XDR systems is to detect and counter security threats at all stages of the cyber-attack, from the point of entry to data extraction. This system offers a universal approach to ensuring the entire security landscape is protected from threats that could cause considerable losses to the organization. The following are the main advantages of using XDR in your business:   #1. Enhanced Visibility Sufficient visibility is vital in the cybersecurity sector. Having...

Read more
Lessons from the cyber front line

Very few weeks go by without news of another cyber attack or data breach and a quick scan of the BBC news website shows that in most months, there is at least one story that makes the national news headlines. While just a few years ago, many cyber attacks would go unnoticed by the public and quietly swept under the carpet, legal requirements to report breaches along with the power of social media, means that...

Read more
Collaboration in Cyber Security is the Key to Combatting the Growing Cyber Threat. Here’s Why

Cyber security has never been so important and in a post-pandemic world it is more important than ever. According to a recent report by Kaspersky, the number of the number of Trojan-PSW (Password Stealing Ware) detections increased by almost a quarter globally - 4,003,323 in 2022 compared to 3,029,903 in 2021. In addition, internet attacks also grew from 32,500,00 globally in 2021 to almost 35,400,000 in 2022. With cybercrime still massively on the rise, organisations...

Read more
Synopsys Finds Significant Increase in Practices to Bolster Software Supply Chain Security

Analysing the software security practices of 130 organisations including Adobe, PayPal and Lenovo, Synopsys's Building Security in Maturity Model (BSIMM) report has found a nearly 50% surge in activities to secure open source software components and integrate security into developer toolchains; indicating greater initiative to tackle software supply chain security over the last 12 months. The findings highlight a significant increase in activities that indicate BSIMM member organizations are implementing a “shift everywhere” approach to...

Read more

How Can You Tell Which Crypto Coins are Legit? In recent years, the cryptocurrency industry has seen an explosion in popularity. Due in part to the pandemic, when people took the time they had stuck at home to evaluate their finances and explore investment opportunities, the sector has seen unprecedented growth which looks set to continue. Despite this, cryptocurrencies remain volatile, with even the big hitters like Bitcoin seeing wild spikes in value over short...

Read more
API Security: Best Tools and Resources

In today's cloud-based enterprise, APIs are a critical part of every business. They're used extensively to foster more rapid application development, and without proper security measures, sensitive data can easily get into the wrong hands.   As modern organizations become more dependent on APIs to achieve their goals, their API security strategy must be up-to-date and in line with recent developments in technology.   API Security is an important aspect of the API lifecycle which...

Read more
blockchain

Before we even try to answer the question of better security, let us take a quick look at Blockchain technology, what it was designed to do, and for whom. For starters, a blockchain acts as a database that stores information in a digital format. It is a ledger shared within a computer network's nodes. Blockchain can maintain a secure and decentralized way of recording transactions and data without needing a third party. That is why...

Read more
IT and Employees Don’t Always See Eye to Eye on Cybersecurity

Although organisations appear to be highly concerned with cybersecurity, they often don’t follow the practices put into place to prevent a data leak. One of the reasons is that IT leaders and employees have completely different views on security measures, and another being the lack of emphasis on security risks, such as outbound threats, where data security training can often be out of date. According to Zivver’s Freedom to Focus research, 47% of employees believe...

Read more
The 4 Most Common OWASP API Security Threats

The Open Web Application Security Project (OWASP) works to improve the security of software worldwide. OWASP’s well-known Top 10 lists increase awareness about the most critical security risks to web applications.   As the foundation for today’s app-driven economy, APIs have risen to the very top of those risks. API usage has exploded and has become ubiquitous across both external-facing and internal applications. To understand and mitigate unique API vulnerabilities and the growing threats against...

Read more
Page 10 of 23 1 9 10 11 23