Eskenzi PR ad banner Eskenzi PR ad banner

Network Security

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks today announced that it was named as a “Leader” and “Outperformer” by GigaOm in the analyst firm’s Radar for SD-WAN Report. This is the first year that Cato was included in the report, alongside 19 other notable vendors in the SD-WAN market. Despite Cato’s “freshman” status, GigaOm rates Cato an Outperformer overall and at the top of the list in both Key Criteria capabilities and Evaluation Metrics. Figure 1: The GigaOm SD-WAN Radar...

Read more
Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

  Armis, the unified asset visibility and security platform, disclosed five critical vulnerabilities, known as TLStorm 2.0, in the implementation of TLS communications in multiple models of network switches. The vulnerabilities stem from a similar design flaw identified in the TLStorm vulnerabilities (discovered earlier this year by Armis), expanding the reach of TLStorm to millions of additional enterprise-grade network infrastructure devices.   In March 2022, Armis first disclosed TLStorm—three critical vulnerabilities in APC Smart-UPS devices....

Read more
Reinventing Asset Management for Cybersecurity Professionals

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see. But that comprehensive view needs to be specific to the security team, which has a different role than IT teams concerned with inventory, software support and license oversight. Security teams that rely on asset inventory from their IT counterparts are challenged by a...

Read more
iPhone with a blank screen

Despite the increased use of mobile device management (MDM), mobile phishing among financial services was at an all-time high last year. A report conducted by endpoint security expert, Lookout, revealed a 125% increase in exposure to considerable risk in both financial services and insurance organisations. The financial report also uncovered that the risk exposure to malware and risky applications increased by over 400%, leaving employees and customers in this industry vulnerable to a breach. Phishing...

Read more
Credit card shopping online

Research has revealed that the likes of Costco, Walmart and The Home Depot are more at risk to web-based cyberattacks then compared to their EU counterparts, according to findings from Outpost24. In a year that saw a global pandemic leading to a 30% surge in online shopping and exponential growth in cybersecurity threats for enterprises, Outpost24 analysed the web application attack surface for 20 of the biggest retailers in Europe and the US to evaluate...

Read more
Corelight logo

Corelight today released new capabilities that provide users with greater network security visibility and the ability to support advanced threat analysis across their entire environment, from physical to cloud. Corelight’s new Software Sensor and Corelight Cloud Sensor for Google Cloud Platform (GCP) deliver comprehensive security insights into network traffic on any platform.   “Organizations today are faced with the challenge of limited visibility across distributed locations, or they have built their network infrastructure in the cloud using Google Cloud or other platform providers,” said Vijit Nair, senior director...

Read more
Hybrid physical-cyber security threats drive supplier integration

As the cyber and physical worlds collide and interact, so the defences in each are now integrating with an example this month being the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider to form Ava Security. Tormod Ree, CEO of Ava Security commented: “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the...

Read more
Mobile phone email

In the age of modern connectivity, emails are the de facto mode of communication. Securing emails from cybercriminals is a difficult task, and many businesses are left scratching their heads when deciding how to keep corporate data and privileged information secure. Zix a provider of cloud email security, productivity and compliance solutions has announced the release of its Advanced Email Threat Protection service for the UK market. This new offering sees the utilisation of machine...

Read more
Circuit board

The adoption of IoT is increasing rapidly. By 2021, it is expected that 35 billion IoT devices will be installed worldwide. While there is an opportunity for businesses to utilise all the benefits of IoT however, many traditional data centres don’t have the bandwidth to handle the large volumes of data collected by IoT devices.  Furthermore, IoT applications require quality features such as low latency with high scalability, reliability and availability. To accommodate this, IoT...

Read more
Homes in Malvern targeted by phishing phone scam

New research has revealed mobile phishing has increased by 37% in Q1 2020 compared to Q4 2019 with much of this rise a result of cybercriminals targeting the millions of those working from home due to the coronavirus pandemic that has plagued the world. The Mobile Phishing Spotlight Report also detailed the costly nature of mobile phishing attacks as an organisation with 10,000 mobile devices could suffer up to $35m for a single mobile phishing...

Read more
Page 1 of 4 1 2 4