Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

Jim D Lookout CipherCloud

Mobile cybersecurity specialists, Lookout, has acquired CipherCloud, a cloud-native security company that operates in the emerging Secure Access Service Edge (SASE) market. Through this acquisition, which combines the Lookout Mobile Endpoint Security with the CipherCloud SASE technologies, Lookout believes it is in the best position to provide industry’s first end-to-end platform that secures an organisation’s entire data path from endpoint to cloud.    Given the rise in the number of remote users and the rapid adoption of cloud technology, the need for...

Read more
AT&T Cybersecurity Launches Managed SASE Solution with Fortinet

AT&T has announced it is expanding its portfolio of Managed Security Services through its alliance with Fortinet to make Secure Access Service Edge (SASE) a reality for enterprises. AT&T SASE with Fortinet is the first, global managed SASE solution at scale that unifies software-defined wide-area network (SD-WAN) with essential network security functions of the SASE framework and 24x7 management. The company notes that this powerful combination of people, processes, and technology will help enterprises to...

Read more

A new study has revealed that women hold only 10 percent of board positions and 16 percent of management positions within the world’s leading cybersecurity companies. The study was carried out by cybersecurity specialists Eskenzi PR and Marketing, and looked at the websites of 138 companies from the Cybersecurity Ventures Hot 150 to understand the ratio between males and females in senior positions. It uncovered that out of 609 board positions, only 60 are taken...

Read more
Malaysia Airlines

Malaysia Airlines has notified its frequent flyer members of a security incident via a third-party IT service provider. According to an email sent to Enrich members on Monday 1 March, the airline advised that the incident took place over a nine-year period between March 2010 and June 2019. They did not, however, disclose the number of individuals impacted. The breached data includes Enrich member names, date of birth, gender and contact details, in addition to...

Read more
Fraud attempts skyrocketed in 2020 according to latest Financial Crime Report from Feedzai

Feedzai, a cloud-based risk management platform, has announced its Financial Crime Report Q1, 2021. Feedzai’s data from financial transactions across the world shows a stark difference in consumer behaviour and financial crime in the Asia-Pacific (APAC) region as compared to Europe (EU) and North America (NA). A clear image appears - a hyper-digital world where east and west are in different recovery stages, reflecting different regional financial crime trends. Overall, 2020 allowed fraudsters to rejoice at...

Read more
How Security Culture Invokes Secure Behaviour

It has always been suspected that security culture and secure behaviour were closely linked, although proof was hard to produce. Today, KnowBe4 released research that shows not only have researchers been able to validate that link, but they also give data that provides conclusive evidence related to the importance of focusing on the human side of security. By examining the behaviour and security culture of 97,661 employees across 1,115 organisations, KnowBe4 has observed that the...

Read more

This week, it was confirmed that international law firm Jones Day had data stolen from cybercriminals and is a direct result of the wider data breach suffered by file-sharing service Accellion. The hacker, which goes by the name Clop, had uploaded much of the sensitive information on the dark web which may have included data on prominent clients like Donald Trump. When contacted by reporters at VICE as to why they carried out the attack,...

Read more
India Bans 59 Chinese Mobile Apps Over ‘Security’

Two new Android survellanceware have been discovered by the Lookout Threat Intelligence Team. Named Hornbill and SubBird, these two campaigns are believed to be connected to the Confucius APT, a well-known pro-India state-sponsored advanced persistent threat group. Lookout’s researchers revealed the spyware specifically targeted personnel linked to Pakistan's military and nuclear authorities and Indian election officials in Kashmir. Hornbill and SunBird are both sophisticated and demonstrate unique spyware characteristics and capabilities. These include techniques used to...

Read more
water-cyber-security-plant

Officials in Florida announced that hackers came scarily close to poisoning the city of Oldsmar by changing the chemical levels during a breach of the computer system at the local water treatment plant. It was a wake-up call, said Pinellas County Sheriff Bob Gualtieri. "Water systems, like other public utility systems, are part of the nation's critical infrastructure and can be vulnerable targets when someone desires to adversely affect public safety." The Guru reached out...

Read more

Acuant, a leading global provider of identity verification solutions, today announced that Northern Block has seamlessly integrated its Identity Proofing and Compliance technology to offer their customers best-in-class Self-Sovereign Identity (SSI) and Verifiable Credential solutions. With Acuant solutions implemented, Northern Block customers have the confidence to accurately verify identities across all channels and provide a faster and more secure process for clients with high-value transaction requirements. Northern Block helps companies acquire new customers with an...

Read more
Page 24 of 296 1 23 24 25 296