Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

Ping Identity Logo

Ping Identity, the leader in Identity Defined Security, today released results of the Ping Identity 2018 Consumer Survey: Attitudes and Behaviour in a Post-Breach Era, unveiling consumer sentiments and behaviours toward security and brands impacted by data breaches. Ping surveyed more than 3,000 people across the United States, United Kingdom, France and Germany to find out what they expect from brands when it comes to the safekeeping of personal information. The survey reveals many consumers...

Read more
image of Chris Camacho, and flashpoint logo

Chris Camacho, Chief Strategy Officer at Flashpoint Fraud is an inevitability of business, and one that most won’t concede they’re susceptible to. But the blunt truth is, insiders who are close to critical systems—or outsiders who are skilled enough to exploit vulnerabilities in anti-fraud and other security controls—will steal. They may target assets they’re entrusted to protect or cook the books to hide their tracks; in the end both types of fraudsters aim to make...

Read more
Image of xforce command

RIT Computing Weekend will have an extra special visitor – the new IBM X-Force Command Tactical Operation Center (C-TOC), which will be making its first visit to a university as part of the Nov. 2–4 event. IBM recently announced the C-TOC, the industry’s first fully operational Security Operations Center on wheels, capable of travelling onsite for cybersecurity training, preparedness and response. Housed in a tractor trailer, the center will visit RIT Nov. 2 before continuing...

Read more
personal data out of control

From email addresses to phone numbers, and from places of work to dates of birth, there’s an alarming amount of information about us online. Europeans have lost track of how far their personal data has traveled, which companies or platforms hold information about their identities, or even how much is ‘out there’ about their own children. In short, too many people in Europe have lost control of their personal data. This is one of the...

Read more
Trend Micro Logo

Trend Micro Incorporated, a global leader in cybersecurity solutions, has identified that UK demand for cryptocurrency skills has jumped by 1130% in the past two years. However, Trend Micro’s analysis of ITJobsWatch data also found that these positions are not being filled by candidates with cybersecurity expertise. The data revealed a disconnect between cryptocurrency and cybersecurity professionals, with neither group taking clear ownership for securing digital transactions. While the list of the top 30 skills...

Read more
Detect and block attacks

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the release of Netwrix Auditor for Network Devices as a part of the new Netwrix Auditor 9.7 platform. The application enables organisations to detect and investigate network security threats and is targeted at network specialists, IT administrators, IT managers and security analysts. Netwrix Auditor for Network Devices enables organisations to reduce the risk of attackers taking control...

Read more
Ciso

IT security leaders in businesses across the globe are stuck with their hands behind their backs when it comes to fighting off cybercrime. They lack influence in the boardroom and find it hard to justify the budgets they need; inevitably making their businesses more vulnerable. The phenomenon is one of the findings of a new report from Kaspersky Lab, which has found that 86% of CISOs now believe cybersecurity breaches to be inevitable, with financially...

Read more
Image of fraud alert page on a laptop

By Luke Rodeheffer and Mike Mimoso Most often, headlines fixate only on the loss of sensitive personal data and payment card information in the wake of a data breach. There is another—and often ignored—piece to this segment of the underground economy: cashing out by criminals, in particular through fraudulent purchases. A network of illicit communities support this part of the theft and fraud lifecycle, and offer a range services that include the creation of shipping...

Read more
Image of Joe Collinwood and CySture Logo

Joe Collinwood at CySure addresses misunderstanding surrounding cookies and consent in terms of GDPR The EU General Data Protection Regulation (GDPR) came into force on 25 May 2018 with great fanfare, and rightly so. It is the most significant change to data protection legislation in Europe for over two decades and puts individuals back in the driving seat of how their data is used. However, there continues to be a lot of confusion within the...

Read more
image of Ewen O’Brien

Written by Ewen O’Brien, EMEA Director, BitSight In light of the almost daily news of companies suffering security breaches, the need for assessing the risk profile of third- and fourth-party suppliers has never been more necessary than it is today. A company may have its own computing infrastructure secured, but the rest of its digital supply chain often remains overlooked. The recent attacks reported by Bloomberg show an increasing severity and sophistication of global supply...

Read more
Page 13 of 42 1 12 13 14 42