Eskenzi PR ad banner Eskenzi PR ad banner

Insight

Merry Song, analyst, Turnkey Consulting

Booking.com and Expedia recently made the headlines – and not because of the hotel deals they were offering as people eased out of lockdown.  Instead, it had been discovered that one of their software providers had not stored sensitive data correctly, running the risk that the details of millions of hotel customers could have been exposed. Around the same time, Ticketmaster UK was fined £1.25 million following a cyber attack in 2018 which flagged that...

Read moreDetails
Author Photo

It’s fair to say that we have all been spending less time jumping onto Wi-Fi hotspots at cafes, hotels, airports or company guest networks, over the last sixth months. But as lockdown measures were eased, we saw more people looking for a change of scenery in coffee bars and pubs offering workspaces. Whether at home or out and about, Wi-Fi has become something we have come to rely on for work and pleasure, while mobile operators increasingly use ‘hand-over’ to...

Read moreDetails
Why the power to neutralise the threat of ransomware lies within your network

Ransomware attacks are on the up. Due to low execution costs, high rates of return, as well as a low risk of being caught, ransomware has become the preferred method of attack for those operating illegally within the online space. In fact, research highlights a surge in the number of ransomware attacks against businesses. In the UK, for example, there was a 195% increase in reported incidents, which equated to an estimated 6.4m ransomware attacks...

Read moreDetails
SASE: A beginner’s guide

In what now seems like a lifetime ago, in late summer 2019 Gartner first coined the phrase Secure Access Service Edge. Since then, “SASE”, as it is now more commonly referred, has generated the kind of hype the industry hasn’t witnessed since SD-WAN first emerged around 2014. The promise was simple enough: enable enterprises to realise all of the long-held (but never fully realised) benefits of moving applications and workloads to the cloud and maintaining...

Read moreDetails
Is 2FA by SMS a bad idea?

Two-factor authentication is ubiquitous and it’s a really valuable tool to protect systems and data assets. But with increasing reliance on home working and remote access in the current pandemic, what mechanism should we choose? It’s very common these days for SMS messages to be used for two-factor authentication – many cloud service providers use this mechanism, government departments have adopted it, and it is also quite common in the banking industry. When shopping online...

Read moreDetails
Why test data does not need to be protected

The title of this article might seem contradictory, but it is not as conflicting as you might think. Sure, we all know that the General Data Protection Regulation (GDPR) prescribes us to protect personal data, wherever it may be. Production, development, testing, QA, training environments – data is stored everywhere. Most people assume that all of this data needs protection at all times, but actually that is not the case. Test data, for example, doesn’t...

Read moreDetails
Internet freedom in Asian countries: an analysis

Asia is a controversial region when it comes to civil liberties, in general, and Internet freedom, in particular. Even in countries like Japan and Singapore, which boast a high level of technological progress and mind-boggling Internet penetration rates, the web is an increasingly regulated environment. Residents of some Asian countries can be subject to severe penalties, including criminal prosecution, for expressing their views on social media and personal blogs. The same goes for news sites....

Read moreDetails
code

New research by Zscaler, analyzing 6.6 billion security threats, has discovered a 260% increase in attacks during the first nine months of 2020. Among the encrypted attacks was an increase of the amount of ransomware by 500%, with the most prominent variants being FileCrypt/FileCoder, followed by Sodinokibi, Maze and Ryuk. Here's what security experts had to say about these findings: Oleg Kolesnikov, VP of Threat Research at Securonix "Having more visibility into the SSL/TLS traffic definitely...

Read moreDetails
cybereason logo

One of the greatest truths in cybersecurity is that defenders need to be right all the time, while cybercriminals only need to be right once. Attacks are increasingly sophisticated and ramified, simultaneously targeting a range of potential entry points with multiple tactics, techniques and procedures. One the other hand, security professionals are faced with a widening attack surface to monitor, each asset with its own specific tool, generating its own stream of alerts and notifications....

Read moreDetails
AI, ML, or just automation?

We all experience artificial intelligence (AI) and machine learning (ML) every day, whether through search engines, voice-controlled devices or simply taking a photograph on a smartphone. For certain areas of industry that rely on big data analysis, both are already proving their value, identifying patterns in data, or relationships between seemingly unrelated information and then defining algorithms that can automate decision making processes. In cybersecurity too, there are clearly some solutions that meet the accepted...

Read moreDetails
Page 22 of 27 1 21 22 23 27