News

In these strange times, we all need something to celebrate, so happy World Password Day!  Intel started World Password Day in 2013 and the first Thursday in May has been used to promote good password practices ever since.  The need for strong passwords to protect personal data has been well-documented, with the 2019 Data Breach Investigations Report revealing that 80% of hacking-related breaches involve compromised and weak credentials.  But lately World Password Day has become the topic of considerable debate....

Read more
WFH

By Prof. John Walker To say we live in unprecedented times must be the understatement of the century – in fact, what we have seen in recent years does amount to gross disbelief. Terrorist attacks finding their way to the streets of the UK, active Russian agents seemingly acting with murderous impunity, whilst looking wondrously up at Church Spires, not to mention the murder of a US based journalist within the walls of a Egyptian...

Read more
Mobile Tracing NHS

Technology has undoubtedly made life more bearable during a global pandemic. From drones being rolled out to deliver medicines and essential items across Ireland, to the rise of video conferencing platforms, such as Zoom creating a more connected community of remote workers. The affordances of our ever increasingly digital epoch have made isolation more tolerable by providing interconnectivity and entertainment. However, there is a darker side to the rapid uptake of technology during this international...

Read more
Alert Logic Offers 90-day Free Vulnerability Detection with Extended Protection

Since the Coronavirus pandemic has taken hold, Alert Logic has experienced a 92 percent increase in deployed endpoints. As a result, the industry’s first SaaS-enabled managed detection and response (MDR) provider is offering a 90-day free vulnerability detection with extended protection to help mitigate cyber-attacks aimed at the increased number of remote workers.  Alert Logic’s recent offer includes machine learning-enabled protection, AWS configuration checks, asset discovery, and vulnerability scanning. The Texas-based cybersecurity giant has also launched a COVID-19 resource centre which provides added advice on how to adjust...

Read more
Things To Know Before Developing Intelligence Requirements.

A survey conducted by fintech security provider Entersekt through YouGov has found that over a third of British consumers (34 percent) distrust digital communications from banks to such an extent that they ignore actions the messages suggest they take. The survey focused on consumers’ attitudes to “paperless banking” – the means by which banks and their customers communicate and administer accounts rather than the tools they use to transact. Conducted online by YouGov in March...

Read more

Today, Cybereason announced that it will extend its award-winning endpoint protection to include mobile devices with its new platforms Cybereason Mobile and Cybereason Mobile MDR. Cybereason Mobile aims to prevent, detect and respond to security issues, shielding customers from emerging mobile threats. With Cybereason’s second new offering, Cybereason Mobile MDR provides a managed service which gives enterprises access to a team of security analysts to counter advanced mobile threats across Android and iOs devices, day...

Read more
wfh

In the span of a couple months, the world as we knew it was turned upside-down. As scientists across the globe conduct experiments in search of the COVID-19 vaccine, the labour market has found itself within its own experiment. That is, the experiment of remote working on a massive scale.   In an effort to slow down the spread of the virus, millions of employees around the world are being told to write their emails, compile their spreadsheets, and hold their meetings from the confines of their dining room...

Read more
edgescan logo

Guram stresses that he is not ‘sponsored by Zoom’ 😊 First of all, nothing is bulletproof and anything can be hacked. We all make mistakes and learn from them. That’s how and why we improve and update software on a regular basis. Question is: on what basis are other blog posters or researchers assuming that there’s RCE, UNC Path Injection, weak or no E2E encryption and many other vulnerabilities which have been mentioned over the...

Read more
One Identity Offers Free Privileged Session Management Capability to Support Critical Infrastructure Providers

As emergency services, public health organisations, utilities and other critical organisations rush to enable as many remote workers as possible, best practices for keeping users secure have understandably become an ongoing challenge. Any organisation relies on privileged IT users to configure systems and perform vital functions so their enterprise stays up and running. If this privileged access is not controlled as it shifts to remote administration, organizations face heightened risk. Un-managed privileged access opens the...

Read more
Finalists Announced for 2020 European Cybersecurity Blogger Awards

The public nominations for the seventh annual European Cybersecurity Blogger Awards 2020 have been collated and finalists announced. To see the full list of nominees and cast your votes in each category, click here: https://docs.google.com/forms/d/e/1FAIpQLSe8AkYMfAAwJ4JZzYRm8GfsJCDON8q83C9_wu5u10sNAt_CcA/viewform Don't miss your chance to vote for your favourite bloggers, vlogger, podcasters or social media accounts in each of the 13 categories. The first round of public nominations is complete, and you now have the chance to vote for your...

Read more
Page 3 of 1042 1 2 3 4 1,042