Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

OPSWAT, provider of solutions to secure and manage IT infrastructure, and Arbit Security, specialised in high-end IT security products, today announced their partnership to provide secure and threat-free data flow for high security networks, including Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) networks and Government and Military classified networks. Aspen Institute Research recently reported that 9 out of 10 IT security professionals at 625 critical infrastructure organisations have experienced at least one...

Read more

Auriga Consulting Ltd (Auriga), the expert data, ICT and security consultancy, today warned that an over emphasis on defence is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defences by focusing on detection and attack response but recovery remains a fragmented process with little investment in Cyber Resilience. Cyber Resilience uses threat intelligence and existing internal resource to enable the organisation to cope with the...

Read more

Cryptzone, a provider of dynamic, context-aware network, application and content security solutions, today announced the appointment of Leo Taddeo as Chief Security Officer (CSO). Taddeo, former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office, will be responsible for analyzing the cybersecurity market to help shape Cryptzone’s vision for security solutions. Prior to joining Cryptzone, Taddeo led more than 400 agents and professional support staff in cyber investigations, surveillance...

Read more

Ofcom this month revealed that Smartphones have overtaken laptops as the most popular device for getting online, but businesses rushing to create apps to reach this market might be wasting their time, according to a new study. New research by web hosting company and domain name registrar 34SP.com into the mobile habits of 1,000 Brits, found that many are deleting apps from their mobile phones at an alarming rate – with 2 in 5 admitting...

Read more

A survey of over 200 IT professionals at this year’s InfoSecurity Europe has found that, while almost 80% of organisations have a process for employees to report phishing emails to the IT/security department, most don’t. In fact, over half of those spoken with (52%) estimated employees report less than 25% of dodgy emails. Digging a little deeper revealed only 8% think that more than 75% of suspicious messages are reported. This surprising statistic comes in...

Read more

On the anniversary of this infamous crime, we ask - how would it be investigated if it happened in 2015? By Martyn Ruks, Technical Director of MWR InfoSecurity. 52 years ago today, on a quiet piece of track somewhere in Buckinghamshire, a Royal mail train was held up by a gang of 15 men, robbing it of the large quantity of cash it was hauling to London. After a successful raid, they made off with...

Read more

Yesterday at Black Hat USA, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal attacks on corporate networks by exploiting insecurely configured enterprise implementations of Windows Server Update Services (WSUS). WSUS allows admins to co-ordinate software updates to servers and desktops throughout their organisations, but the Microsoft default install for WSUS is to use HTTP and not SSL-encrypted HTTPS delivery. By exploiting this weakness, the Context researchers were able...

Read more

Yesterday, Imperva, Inc. (NYSE:IMPV) released its August Hacker Intelligence Initiative Report (HII Report) at Black Hat USA 2015: “Man in the Cloud Attacks.” This new report uncovers how a new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronisation services, such as Google Drive and Dropbox, to turn them into devastating attack tools not easily detected by common security measures. The report notes that this next-generation attack does not require compromising...

Read more

Tripwire, Inc., a leading global provider of advanced threat, security and compliance management solutions, today announced results of an extensive security assessment of three top-selling smart home automation hub products available on Amazon. The research uncovered zero-day flaws in each hub that could allow hackers to take control of smart home functionalities. Smart home hubs are used to control lighting, heating, locks and cameras in people’s homes. In order to understand the risks associated with smart...

Read more

We can see what is hot. But how long will it be hot for? Spotting growth sectors in security is easy. But long-term trends are always about underlying changes in the way technology is used Ignore the look of certainty and grandiose statements of purpose that emanate from big tech firms, nobody in the security industry is absolutely sure where the industry is going. But if in doubt when making a startup investment, one way...

Read more
Page 185 of 295 1 184 185 186 295