Eskenzi PR ad banner Eskenzi PR ad banner

Insight

The Power of Diversity: Building Stronger Cybersecurity

In an increasingly digital world, cybersecurity has become a critical aspect of our daily lives, with our personal information, financial data, and even national security at stake. However, as the field of cybersecurity continues to evolve, a glaring lack of diversity persists. The underrepresentation of certain groups, including women, minority communities, and individuals with diverse backgrounds, not only deprives the industry of valuable perspectives, innovative ideas and thought leadership, but also poses a significant risk...

Read more
proxies

Selecting the appropriate proxy provider can frequently appear as a challenging endeavor. The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. However, determining the one that aligns with your needs and effectively comparing the various options can be puzzling. In this article, we're going to explore crucial aspects to keep in mind while choosing a proxy provider: Steer Clear of...

Read more
threat hunting

Cybercriminal tactics continue to grow in number and advance in ability; in response, many organisations have seen the need to reach a security posture where their teams can proactively combat threats.   Threat hunting plays a pivotal role in modern organisations' cybersecurity strategies. It involves actively searching for signs of advanced threats and vulnerabilities beyond passive defence mechanisms. The MITRE ATT&CK Framework is an industry-standard threat hunters can use to proactively ensure they have protection...

Read more
Guide to ransomware and how to detect it

The landscape of ransomware has undergone rapid evolution, shifting from a relatively straightforward form of malicious software primarily affecting individual computer users, to a menacing enterprise-level threat that has inflicted substantial harm on various industries and government institutions. Ransomware attacks are strategically designed to either encrypt or delete critical data and system files, compelling organisations to meet the attackers’ financial demands. These assaults specifically focus on compromising data repositories, backup systems, and vital records that are essential...

Read more
ICS Reconnaissance Attacks – Introduction to Exploiting Modbus

Despite being widely used in Industrial Control Systems (ICS), Modbus has been recognised as an insecure protocol. Securing and attacking Modbus has therefore been a topic for years, and it was first in 2018 that the Modbus Security protocol (MSP) was published, nearly 40 years after the initial introduction of Modbus. This article will introduce some common Modbus reconnaissance attacks, as well as briefly discussing the impact of MSP on those attacks.   Modbus in...

Read more
Nurturing Our Cyber Talent

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry:   There are many ways we can inspire new cybersecurity professionals to join our industry. One way is to increase awareness about the importance of cybersecurity and its increasing demand. This can be done through educational programs at schools, colleges,...

Read more
Machine Learning is a Must for API Security

Modern digital transformations have been fuelled by APIs, altering how many businesses and organizations run. However, the recent innovation and digital transformation wave have also opened up new attack surfaces for cybercriminals. Companies are forced to respond to an increase in API threats, but they quickly learn that traditional, static methods of API security are ineffective. Machine learning (ML) and artificial intelligence (AI) become helpful allies in stopping API attacks. The topic of whether to...

Read more
insider threat

In today's digital age, where organisations heavily rely on technology and data, ensuring strong Cyber Security practices is paramount, and one often overlooked aspect, is the departure of staff members. The departure of an employee can introduce vulnerabilities and risks if not handled properly. Establishing a well-defined process for staff departures is crucial not only for maintaining operational continuity but also for safeguarding sensitive information from potential cyber threats. Chris White, member of International Cyber...

Read more

In an age dominated by digital technologies and the constant evolution of information technology (IT), businesses are ceaselessly exploring innovative avenues to streamline operations and curtail costs. Among the emerging trends, the integration of solar power into IT infrastructure stands out as a transformative force. Energy Efficiency and the Bottom Line Conventional data centres, pivotal components of contemporary IT infrastructure, have earned a reputation as voracious consumers of energy. The monumental computational prowess required to...

Read more
Need For Speed Hot Pursuit iPhone Launch

In the fast-paced world of gaming, the allure of achieving the next level, unlocking a new weapon, or solving an intricate puzzle can be irresistible. Just as irresistible, though, is the allure of cybercriminals seeking easy targets in the vast digital playground of the gaming world. With the UK and US gaming markets being amongst the largest and most lucrative, the need for gamers to understand cybersecurity has never been greater. This article provides resources...

Read more
Page 4 of 23 1 3 4 5 23