Eskenzi PR ad banner Eskenzi PR ad banner

Insight

Five processes every organisation needs for successful BizDevOps

BizDevOps in a nutshell Many organisations claim to be data-centric and data-driven. Making informed decisions based on what their organisation’s data is telling them. But how many organisations can truly say they have an effective and operational Data Management framework in place? The good news is that it is relatively easy to remove the toil and burden with automation and implementing a Data Model program to improve the accuracy and quality of the underlying data....

Read more

A few years ago, DLP was a hot security buzzword and a relevant single offering. Now, it’s been swallowed up as part of other, beefier solutions that offer a buffet instead of an entrée. However, to understand where to find DLP today and what exactly it’s doing, it helps to get a sense of the whole picture. Let’s review the rise, decline and – reincarnation? - of the Data Loss Prevention category. Where DLP Started...

Read more
How poor cybersecurity policies disrupt business continuity

As the world moves increasingly online, risk management professionals and business owners must continue to invest in the prevention of cyber threats. It’s surprising, to see just how many businesses have plans in place for all sorts of things such as fire, flood and COVID-related issues, yet don't have any action plans in place should a cyber attack occur.  What happens in the minutes, hours and days after an attack is crucial. This is where...

Read more
Lessons From the 2023 National Risk Register Report  

Cybersecurity is a matter of national and international security and should be prioritised as such. This is particularly important when it comes to protecting Critical National Infrastructure (CNI) and the services that UK citizens rely on in their daily lives, as the consequences of disruption to these services has the potential to be devastating. With the world more digitised and interconnected than ever, a significant attack on CNI could lead to physical harm or even...

Read more
Understanding Changes in the OWASP API Security Top 10 List

The Open Web Application Security Project (OWASP),  a non-profit foundation devoted to web application security, recently released the 2023 OWASP API Security Top 10 list. The list aims to raise awareness about the most common API security risks plaguing organisations and how to defend against them.   The 2023 list provides an update to the original list, published in 2019. Since that time, API security threats have accelerated and evolved, which has been reflected in...

Read more

One of the most difficult problems for security professionals to grapple with is defending against dangers that come from within an organisation. Unfortunately, protecting against insider threats is often more complicated than traditional threat prevention. There are many different ways that an insider threat can manifest, making it necessary to approach the issue from a variety of angles in order to adequately address the risk. While this is a daunting task for security teams, it...

Read more

Hybrid work models and broadly adopted cloud technology disperse operations extensively; data is moved, stored, and accessed from highly distributed locations. Within such a disseminated environment, cybersecurity hygiene concerns businesses and organisations, especially nowadays, where highly skilled cybercriminals become more active, and their attacks are predicted to intensify further and increase the cost at a 15% annual rate. In today's digital age, every business, no matter its size, faces increasing cybersecurity threats, including the risk...

Read more
Why I started the Security Serious Unsung Heroes Awards

I don’t typically like awards; let’s be honest, more often than not, they’re pay to play – and most of us see them for what they are!   It begs the question; how come we ended up running an award that literally makes no money and takes a huge amount of time to organise for the heroes that work for me - Beth Smith and Nicole Sigrist?   It’s because there have never been any...

Read more
data breach

One of the most pressing cybersecurity concerns for organisations today is preventing the exfiltration of sensitive data. Even companies whose main focus is not digital or technological in nature have to manage, store, send, and receive considerable amounts of data in the course of regular business operations. While cybersecurity is not always a top priority for all enterprises, it must be seriously considered and treated with the gravitas it deserves. It is crucial for businesses...

Read more
Why Schools are Low-Hanging Fruit for Cybercriminals

Hackers are increasingly targeting schools as technology is being integrated more deeply into teaching. Educational institutions own many sensitive data, such as personnel and financial information, as well as intellectual property. Unfortunately, many schools lack adequate cybersecurity measures, making them easy targets for fraudsters. In this blog post, we'll look at the factors that make schools susceptible to cyberattacks and discuss why it's crucial to have robust cybersecurity measures to safeguard the academic community. Lack...

Read more
Page 5 of 23 1 4 5 6 23