Editor's News

Eskenzi PR, the driving force behind Security Serious , has today announced the third annual Security Serious Unsung Heroes Awards are now open for nominations.  The awards are a chance for the people, not products, on the front lines – whether it’s teaching others, working with law enforcement or battling cyber threats in organisations - to come together and receive the recognition they deserve. Nominations are open until the 3rd of August and The Unsung...

Read more

A study of 1000 UK adults, carried out in May 2018, showed that the main reason people upgrade their smartphone is due to the embarrassment of having an older handset, rather than the desire to have the latest tech.   Despite mobile technology drastically improving in recent years, the research, by Satsuma Loans, revealed that 63% of respondents would be embarrassed if their peers saw them using a handset that was more than a couple...

Read more

New research from Unisys Corporation found that IT professionals reported three incidents on average where sensitive information had been lost last year, with some respondents reporting 11 losses for the year. Respondents also reported an average of nine incidents per month where they had to address highly severe security issues. The survey, conducted by information insights company Information Services Group Inc. (ISG), asked 404 enterprise IT professionals in North America, Europe and Asia Pacific to assess their...

Read more

Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today launched Cylance Smart Antivirus, AI-powered antivirus software designed specifically for consumers. By extending the enterprise-grade AI of CylancePROTECT into the home, Cylance provides internet users with next-generation security software that proactively predicts and blocks never-before-seen threats. More than 350,000 new pieces of malware are created every day, and traditional consumer antivirus software simply can’t keep pace with today’s security reality. Existing solutions rely on reactive, signature-based technologies that slow...

Read more

Janrain®, the company that pioneered the Customer Identity and Access Management (CIAM) category, and Akamai Technologies, Inc. (NASDAQ: AKAM), the world’s largest and most trusted cloud delivery platform, today announced that they have partnered to provide Janrain Secure Edge, bringing new integrated security capabilities to the Janrain Identity Cloud®, the world’s largest identity network. The value of customer profile data linked to customer identities has grown dramatically over the past decade and is one of...

Read more

Insider threats represent a significant danger to organisations trying to guard sensitive data from breaches, especially as businesses are tasked with protecting ever-growing amounts of data in the GDPR era. To tackle this, managed services provider EACS believes that privileged access management (PAM) needs to become a fixture of any cybersecurity strategy, and has demonstrated this commitment by entering into a collaborative partnership with PAM pioneers Thycotic.   The collaboration will see EACS and Thycotic come together to...

Read more

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix. Its analysis of data from more than 500 websites globally show that, apart from a dip in February, large-scale attacks have followed an upward trend over the first half of the year. May and June registered four...

Read more

RiskIQ, the global leader in digital threat management, today released a report mining the company’s massive repository of internet data. The report maps the global internet attack surface over a two-week period, and in the process, reveals the true extent of the modern corporate attack surface. The report, ‘The anatomy of an attack surface: Five ways hackers are cashing in’ is a data-driven exploration of five different approaches hackers take to target businesses via the...

Read more

During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise. On only seven percent of systems could the difficulty of accessing critical resources be considered "moderate". Penetrating the network perimeter has also become easier over time; the difficulty of accessing the internal network was assessed as "trivial" in 56 percent of tests in 2017, compared to 27 percent...

Read more

Despite the growth in data breaches, senior executives at UK firms think their cybersecurity protection is top-notch, according to a new survey conducted by research and consultancy firm Ovum for Silicon Valley analytics firm FICO. Three out of four executives from UK firms said their firm was better prepared than their competitors, and 43 percent said their firm was a top performer. While this overconfidence was seen across the eight regions surveyed, Canada was the...

Read more
Page 10 of 267 1 9 10 11 267