News

The third annual Security Serious Unsung Heroes Awards  winners were revealed last night in a fun and inspiring celebration at St Bart’s Brewery in London. The awards celebrate the people, not products, of the cyber security industry. From the best ethical hackers and cybersecurity’s rising stars to the best sales leader and the coveted Godfather/Godmother of security, the categories recognised individuals and teams working hard to protect Britain from cybercrime and raise awareness of security issues.     The free event was a...

Read more

Cybersecurity company CyberInt has been shortlisted for a Security Serious Unsung Hero award in the Security Avengers category In an era where cybercriminals plan and orchestrate attacks in the anonymous recesses of the Dark Web, effective threat intelligence has to become increasingly pro-active and investigative. To enable enterprises to extend their security perimeters to encompass the Dark Web forums where organised criminal gangs (OCGs) hide, CyberInt has assembled a unique team of cyber sleuths comprised...

Read more

Janrain®, the company that pioneered the Customer Identity and Access Management (CIAM) category and Trusona, the global leader in passwordless identity authentication, today announces a go-to-market partnership that will facilitate the creation of a frictionless, no username/password customer journey while enhancing security within the solution stack. Together Janrain and Trusona will jointly target consumer fintech, insurance and media brands in the EMEA region who are establishing and retaining app-based relationships with their customers as a...

Read more

By Ronald Sens, EMEA Director, A10 Networks  What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the...

Read more

On Monday, over 70 of the great and good in cybersecurity gathered for a Flash Mob event outside the Tower of London to raise awareness of cybersecurity, offering their hints and tips on what you should do to be more secure online! It’s all part of Security Serious Week, an event organised by Eskenzi PR, which runs alongside European Cyber-Security Awareness Month to get the industry to share their skills and educate the wider community on...

Read more
Google Play Logo

Another set of fake finance apps has found its way into the official Google Play store. This time, the apps have impersonated six banks from New Zealand and Australia (CommBank, ANZ, ASB Bank), the United Kingdom (TSB Bank), Switzerland (PostFinance) and Poland (Santander Bank Polska SA), and the Austrian cryptocurrency exchange Bitpanda. Using bogus forms, the malicious fakes phish for credit card details and/or login credentials to the services. The malicious fakes were uploaded to...

Read more
Deloitte Logo

Today Deloitte announced the findings of their annual UK mobile consumer survey, which provides insight into the mobile behaviour of more than 4,000 smartphone users. According to the latest figures, smartphone penetration has seen growth across all age groups, with the 55-75 category seeing the most growth increasing from 40 per cent in 2013 to 77 per cent in 2018. Smartphones in the hands of shoppers are rapidly becoming a major influence on UK retail...

Read more
Certes Networks Logo

It is no surprise that hackers will always target high value, critical data, so amongst some of the most targeted industries is healthcare; the highly sensitive patient data stored in this industry creates a playground ready for waiting hackers to exploit. In the past five years alone, healthcare breaches have grown in both frequency and size, with the largest impacting as many as 80 million people. Last year, the NHS suffered significant disruption from WannaCry,...

Read more

Large organizations utilize a variety of technologies and solutions to create cyber resiliency, an important part of the best practice known as Defense in Depth. But, using disparate systems can actually result in increased security exposure and risks, and slower response to threats. A few years ago, Cisco began working with the best and brightest minds around the world to address this issue. This led to the creation of their security technology program, which included...

Read more

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, coupled with an acute shortage of skilled security professionals, IT security teams need both a new approach and powerful new tools to protect data and other high-value assets. Increasingly, they are looking to artificial intelligence (AI) as a key weapon to win the battle against stealthy threats inside...

Read more
Page 20 of 1033 1 19 20 21 1,033