Eskenzi PR Eskenzi PR

Insight

Business security remains resilient in the wake of coronavirus

The coronavirus pandemic has put cybersecurity under a renewed spotlight. New ways of working and a fragmented workforce has challenged CISOs and their security teams; as the threat landscape has grown, nefarious actors have jumped at the chance to exploit the ever-fluid situation. We have seen attacks grow in frequency and sophistication; Telstra’s Agility Report, which surveyed 500 senior IT and business decision makers across Europe was released earlier this year, and revealed that over...

Read more
Author headshot

As one of the unfortunate benefactors from the changing business behaviours of the pandemic, ransomware attack trends continue to evolve. During the last year, malicious actors have attacked anything from healthcare organisations and medical trials, to education and the public sector, and even business supply chains. The gravity of the threats of ransomware was exemplified by the attack that shut down the cross-country gas pipeline system Colonial Pipeline; the largest U.S. fuel pipeline, leading to...

Read more
Reinventing Asset Management for Cybersecurity Professionals

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see. But that comprehensive view needs to be specific to the security team, which has a different role than IT teams concerned with inventory, software support and license oversight. Security teams that rely on asset inventory from their IT counterparts are challenged by a...

Read more
Author headshot

Almost every day, no matter where we go or what we do, we often have to provide proof that we are who we say we are. This can be when you open up a bank account, collect a parcel from the post office, or when you make certain purchases. What all these situations have in common is that we, as citizens, currently have to produce physical documents, whether it is a passport or driver’s license,...

Read more
Author headshot

With the steady stream of recent ransomware headlines from Colonial Pipeline to the Irish Health Service, it is clear that attempts to stem the wave of successful attacks are not working.  The worry of waking up to a ransom message is what keeps many IT security managers and their bosses awake at night. For cybercriminals, ransomware is a low-risk, high reward activity, with a virtually unlimited supply of potential victims. To make matters worse, the...

Read more
Author headshot

The evolution of the workplace has accelerated over the past year for reasons too painfully obvious to mention. In light of the office exodus, employers have been set the enormous task of adapting and accommodating a remote workforce and managing morale in the face of furloughs. Among the many practical challenges is shoring up your cybersecurity defences. The several risks posed by furloughed and remote workers may not occur to many employers, so here’s a...

Read more
Stress person on computer

A CISOs workday is riddled with high-stress situations as they constantly battle the deluge of threats emerging from the ever-expanding threat landscape. Therefore it is no wonder that the majority of technology leaders are feeling stressed.    In recent years the challenges that CISOs face have only intensified. Since the pandemic, security professionals have had to carry out a mass overhaul of their companies systems and infrastructure in order to facilitate a work-from-anywhere environment. When...

Read more
Author headshot

DevOps is fast becoming a central part of enterprise IT. For entirely understandable reasons, too. As organisations mature and grow, unintended IT silos often prevent the innovation of new products and services from taking flight. DevOps represents the unification of Development and Operations teams and, within that, huge gains for productivity, efficiency and innovation in the world of software development. DevOps automates much of the labour and time intensive processes that historically burdened software development...

Read more
Author headshot

When you look at the root causes of a breach – the most prevalent cause is human error.  But dig a little deeper and that human error is often failure to patch known security vulnerabilities – many of which have gone unnoticed for not just a few days, but often months and years. This past years’ bout of VPN related breaches is a great example, especially as patches were available over a year ago. Yet,...

Read more
Cybersecurity and Online Gaming

The online gaming industry has exploded in recent years and is expected to generate close to $200 billion in revenue by 2022. Popular games are reporting revenues in the range of hundreds of millions of dollars per month.   This booming industry is seeing significant growth, largely due to the pandemic, with many turning to online gaming to escape some of  the realities that consumed many of us over the past year. Coupled with the...

Read more
Page 2 of 10 1 2 3 10