This Week's Gurus

Tweet chat

In our first-ever IT Security Guru Tweet Chat, we were joined by Javvad Malik, Dr. Jessica Barker, Mo Amin, Ed Tucker and Lisa Forte as they debated the human factor in security. These leading figures from within the cybersecurity community, whom have a wealth of experience and are best placed to talk about the importance of the human element, are deeply passionate about this widely discussed topic. Too much technology? We began with a question...

Read more
Computer with encryption

From: Thomas, Kevin Sent: 24 August 2019 10:43 To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, Javvad Sent: 24 August 2019 11:03 To: Thomas, Kevin Subject: Encryption Hi Kevin, Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those...

Read more
Anatomy of an Advanced Persistent Threat

By Tarik Saleh, Senior Security Engineer at DomainTools Advanced Persistent Threats are long term patterns of network exploitation that go undetected for extended periods of time and are usually aimed at high profile targets such as governments, higher education institutions, political activists, and companies. They are often motivated by economic, political, and financial reasons, and the attacks tend to be highly targeted, resourceful, and risk tolerant.   The typical APT involves several phases:   Infiltration/Initial compromise:  This...

Read more
security awareness

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, reviewed the results of tens of thousands of simulated phishing tests over the course of Q2 2019 and found that more than 50 percent of those related to social media had “LinkedIn” in the title. With this information, organisations need to train their users how to recognise and manage phishing emails that come into the corporate network. KnowBe4’s analysis shows that...

Read more
Securonix logo

Securonix, Inc., the leader in next-gen SIEM, today announced that it has achieved SOC2 + HITRUST Type 2 certification for the Securonix SaaS environment. This is the latest advancement in Securonix’s ongoing commitment to provide a highly secure and industry compliant environment for protecting and safeguarding client information. The certification validates Securonix’s adherence to state and federal security, privacy, and regulatory standards for healthcare data. The Securonix SaaS platform operates on AWS, the most secure...

Read more
Domaintools logo

DomainTools, a leader in domain name and DNS-based cyber threat intelligence, today announced the results of the study “Staffing the IT Security Function in the Age of Automation”, conducted in conjunction with the Ponemon Institute. More than 1,400 security professionals based across the US, the UK and APAC provided answers on the impact that automation and artificial intelligence (AI) will have on the staffing of IT security functions. All respondents participate in attracting, hiring, promoting...

Read more
Kaspersky Lab logo

Kaspersky Lab has unveiled the next generation of its endpoint protection with new Kaspersky Endpoint Security for Business. The product features Adaptive Anomaly Control, which intelligently perceives and blocks anomalous applications and user behavior, and offers improved protection from miners and network threats. Kaspersky Endpoint Security for Business now also provides users with a web-based management console, along with features to help automate administrator tasks — all to give IT security teams greater control across...

Read more
Wrike

Collaborative work management (CWM) platform Wrike has announced seven new security features, including encryption key management, customized access management and cloud access security broker (CASB) integration support. The company has also earned the ISO/IEC 27001:2013 certification from the British Standards Institution, which ensures that Wrike has an end-to-end security framework and a risk-based approach to managing information security. The Wrike security strategy includes a comprehensive approach across five categories: physical, network, system, application, and people....

Read more
Gigamon logo

Gigamon Inc. (“Gigamon”), the essential element of security infrastructure, providing pervasive visibility to network traffic across physical, virtual, and cloud environments, announced the release of the latest research report from Gigamon Applied Threat Research (ATR), How the Most Prolific Malware Traversed Your Network Without Your Knowledge. Based on observed attack data over the second half of 2018 (2H 2018), the report reveals the command-and-control and lateral activities of three highest-volume malware, Emotet, LokiBot, and TrickBot....

Read more
Page 1 of 68 1 2 68