Eskenzi PR Eskenzi PR

Network Security

Reinventing Asset Management for Cybersecurity Professionals

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see. But that comprehensive view needs to be specific to the security team, which has a different role than IT teams concerned with inventory, software support and license oversight. Security teams that rely on asset inventory from their IT counterparts are challenged by a...

Read more
iPhone with a blank screen

Despite the increased use of mobile device management (MDM), mobile phishing among financial services was at an all-time high last year. A report conducted by endpoint security expert, Lookout, revealed a 125% increase in exposure to considerable risk in both financial services and insurance organisations. The financial report also uncovered that the risk exposure to malware and risky applications increased by over 400%, leaving employees and customers in this industry vulnerable to a breach. Phishing...

Read more
Credit card shopping online

Research has revealed that the likes of Costco, Walmart and The Home Depot are more at risk to web-based cyberattacks then compared to their EU counterparts, according to findings from Outpost24. In a year that saw a global pandemic leading to a 30% surge in online shopping and exponential growth in cybersecurity threats for enterprises, Outpost24 analysed the web application attack surface for 20 of the biggest retailers in Europe and the US to evaluate...

Read more
Corelight logo

Corelight today released new capabilities that provide users with greater network security visibility and the ability to support advanced threat analysis across their entire environment, from physical to cloud. Corelight’s new Software Sensor and Corelight Cloud Sensor for Google Cloud Platform (GCP) deliver comprehensive security insights into network traffic on any platform.   “Organizations today are faced with the challenge of limited visibility across distributed locations, or they have built their network infrastructure in the cloud using Google Cloud or other platform providers,” said Vijit Nair, senior director...

Read more
Hybrid physical-cyber security threats drive supplier integration

As the cyber and physical worlds collide and interact, so the defences in each are now integrating with an example this month being the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider to form Ava Security. Tormod Ree, CEO of Ava Security commented: “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the...

Read more
Mobile phone email

In the age of modern connectivity, emails are the de facto mode of communication. Securing emails from cybercriminals is a difficult task, and many businesses are left scratching their heads when deciding how to keep corporate data and privileged information secure. Zix a provider of cloud email security, productivity and compliance solutions has announced the release of its Advanced Email Threat Protection service for the UK market. This new offering sees the utilisation of machine...

Read more
Circuit board

The adoption of IoT is increasing rapidly. By 2021, it is expected that 35 billion IoT devices will be installed worldwide. While there is an opportunity for businesses to utilise all the benefits of IoT however, many traditional data centres don’t have the bandwidth to handle the large volumes of data collected by IoT devices.  Furthermore, IoT applications require quality features such as low latency with high scalability, reliability and availability. To accommodate this, IoT...

Read more
Homes in Malvern targeted by phishing phone scam

New research has revealed mobile phishing has increased by 37% in Q1 2020 compared to Q4 2019 with much of this rise a result of cybercriminals targeting the millions of those working from home due to the coronavirus pandemic that has plagued the world. The Mobile Phishing Spotlight Report also detailed the costly nature of mobile phishing attacks as an organisation with 10,000 mobile devices could suffer up to $35m for a single mobile phishing...

Read more
Working from home laptop face mask

Digital collaboration tools have been around for years, however for a lot of businesses they have fallen under the radar until now. Since the outbreak of COVID-19, many organisations have been forced to ask their employees to work from home. This has made these tools a necessity for businesses whose activities rely on collaboration between employees. Finding the right collaborative solutions for your company depends on the unique structure and needs of your organisation. Here...

Read more
Teaching paper computers

Cybersecurity continues to be a challenge for businesses of all sizes, especially as workers are shifting to a remote workforce globally. According to recent research by Promon, the Oslo-based mobile security company which last year revealed flaws in the Home Office’s Brexit app, two-thirds of remote workers in the UK have not been given any cybersecurity training from employers in the past 12 months, while 77% say they aren’t worried about their cybersecurity while working remotely....

Read more
Page 1 of 4 1 2 4