Eskenzi PR ad banner Eskenzi PR ad banner

Network Security

The role of the CISO has never been more challenging, and the hits just keep on coming. The SEC’s revised disclosure rules, which came into effect in December 2023, potentially place personal liability on CISO shoulders, as did its lawsuit against SolarWinds CISO Timothy Brown. Even though the court threw out much of the SEC’s claims against him, CISOs remain at risk of personal liability for security failings. Meanwhile, the widespread adoption of AI and...

Read moreDetails
Five processes every organisation needs for successful BizDevOps

Game Servers allow online players to interact in real time and compete or cooperate with people who are capable of connecting. If players are going through the trouble of hosting a server it increases the chances of having a more sociable experience. It doesn’t matter if users are just having a leisurely game night or an all-out war; game servers are used in all gaming situations.  What is a Game Server? In a multiplayer game,...

Read moreDetails
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks today announced that it was named as a “Leader” and “Outperformer” by GigaOm in the analyst firm’s Radar for SD-WAN Report. This is the first year that Cato was included in the report, alongside 19 other notable vendors in the SD-WAN market. Despite Cato’s “freshman” status, GigaOm rates Cato an Outperformer overall and at the top of the list in both Key Criteria capabilities and Evaluation Metrics. Figure 1: The GigaOm SD-WAN Radar...

Read moreDetails
Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

  Armis, the unified asset visibility and security platform, disclosed five critical vulnerabilities, known as TLStorm 2.0, in the implementation of TLS communications in multiple models of network switches. The vulnerabilities stem from a similar design flaw identified in the TLStorm vulnerabilities (discovered earlier this year by Armis), expanding the reach of TLStorm to millions of additional enterprise-grade network infrastructure devices.   In March 2022, Armis first disclosed TLStorm—three critical vulnerabilities in APC Smart-UPS devices....

Read moreDetails
Reinventing Asset Management for Cybersecurity Professionals

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see. But that comprehensive view needs to be specific to the security team, which has a different role than IT teams concerned with inventory, software support and license oversight. Security teams that rely on asset inventory from their IT counterparts are challenged by a...

Read moreDetails
iPhone with a blank screen

Despite the increased use of mobile device management (MDM), mobile phishing among financial services was at an all-time high last year. A report conducted by endpoint security expert, Lookout, revealed a 125% increase in exposure to considerable risk in both financial services and insurance organisations. The financial report also uncovered that the risk exposure to malware and risky applications increased by over 400%, leaving employees and customers in this industry vulnerable to a breach. Phishing...

Read moreDetails
Credit card shopping online

Research has revealed that the likes of Costco, Walmart and The Home Depot are more at risk to web-based cyberattacks then compared to their EU counterparts, according to findings from Outpost24. In a year that saw a global pandemic leading to a 30% surge in online shopping and exponential growth in cybersecurity threats for enterprises, Outpost24 analysed the web application attack surface for 20 of the biggest retailers in Europe and the US to evaluate...

Read moreDetails
Corelight logo

Corelight today released new capabilities that provide users with greater network security visibility and the ability to support advanced threat analysis across their entire environment, from physical to cloud. Corelight’s new Software Sensor and Corelight Cloud Sensor for Google Cloud Platform (GCP) deliver comprehensive security insights into network traffic on any platform.   “Organizations today are faced with the challenge of limited visibility across distributed locations, or they have built their network infrastructure in the cloud using Google Cloud or other platform providers,” said Vijit Nair, senior director...

Read moreDetails
Hybrid physical-cyber security threats drive supplier integration

As the cyber and physical worlds collide and interact, so the defences in each are now integrating with an example this month being the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider to form Ava Security. Tormod Ree, CEO of Ava Security commented: “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the...

Read moreDetails
Mobile phone email

In the age of modern connectivity, emails are the de facto mode of communication. Securing emails from cybercriminals is a difficult task, and many businesses are left scratching their heads when deciding how to keep corporate data and privileged information secure. Zix a provider of cloud email security, productivity and compliance solutions has announced the release of its Advanced Email Threat Protection service for the UK market. This new offering sees the utilisation of machine...

Read moreDetails
Page 1 of 4 1 2 4