Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

Centripetal Expands Portfolio with DNS Offering

The very elements crucial for a business's functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas, where external factors come into play, are the least secure, representing vulnerabilities in your organisation's attack surface.. Adding to the complexity, this surface is constantly changing, evolving with your business and the environment in which...

Read more
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result in some very dire consequences for any business. The IT Security Guru chatted with Love Andren, Junior Application Security Auditor, Ghostlabs AppSec at Outpost24, to understand more about this threat. IT Security Guru (ISG) -...

Read more
Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment

For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure them have existed. Manufacturing, agriculture, critical national infrastructure, and healthcare to name but a few, are all industrial verticals which now more than ever have a considered need for cybersecurity controls to protect their Operational Technology (OT) systems and equipment which interact and impact the physical environment. Historically, in a...

Read more
Labor crunch highlights the cybersecurity gaps in threat intelligence practices

A smart building controls activities such as heating, ventilation, air conditioning, lighting, and security through automated processes. Many smart buildings use Internet of Things (IoT) technology, which means they contain sensors to collect data and software to manage it to reduce energy consumption and environmental effect. The demand for this type of construction will skyrocket in the future years. Recent studies predict that the worldwide smart building industry would reach $127.09 billion by 2027, with...

Read more

Statistics show that the risks of occupational injuries in the tech sector are lower compared to other industries. A tech career doesn’t sound like something that poses significant risks. So, the question is, should tech businesses be concerned about employees’ health and safety?  The simple answer is yes! Even if the risks are lower, that doesn’t mean they don’t exist at all. Providing a safe work environment is not only beneficial for the employees’ wellbeing...

Read more
Guest blog: The death throes of the password? Key takeaways from the One Identity Infosecurity Europe survey

By Dan Conrad, AD Security and Management Team Lead at One Identity Authentication is one of the hottest topics in cybersecurity right now. As biometrics, MFA, and a range of other authentication methods continue to threaten the password’s supremacy, we thought it was worth finding out what industry professionals thought about it all. So that’s what we did. At InfoSecurity Europe 2022, One Identity surveyed more than 100 security and IT professionals to get a...

Read more
Cybersecurity is complex – but it doesn’t need to be costly or complicated

The pandemic tested the business resilience of every organisation. Small and medium sized enterprises (SMEs) had to maximise their digital footprint to keep operational, service their customers and survive. Just as companies are starting to return to some semblance of new normal, another threat is on the horizon. The pandemic has fuelled an increase in cybercrime that shows no signs of abating. Small and medium sized enterprises caught in the cross hairs The speed with...

Read more
The Inside Man Season 4: The Future of Cybersecurity Awareness Training

Corporate training videos. The words alone make you feel bored. They summon dreary memories of wasted hours, terrible acting and worse storytelling. If I told you that it doesn’t have to be that way, that training videos can be informative, engaging and even exciting, would you believe me? You’d be forgiven if you didn’t. But that’s exactly what KnowBe4’s ‘The Inside Man’ is. For four seasons now, the show has been seamlessly interweaving, believe it...

Read more
scam

According to the Federal Bureau of Investigation (FBI), online shoppers risk losing more than $53 million during this year's holiday season. Scams ranging from socially engineered emails promising great deals to hard-to-find gifts popping up for sale but never making it to the buyer's address, the festive season is cybercriminals' and fraudsters' favourite time of the year. So, what should consumers do to shop safely? We asked cybersecurity experts what they thought of holiday shopping...

Read more

Technology is an often overlooked yet vitally important factor when setting up or developing a successful business. Even if your business doesn’t physically require digital technology to undertake your services (physical trades, physical stores ect…), there’s always somewhere within your establishment that digital or security-based technology can be a worthwhile investment. Small businesses can find themselves on the back foot very quickly when starting up. It often isn’t all sunshine and roses, lots of money...

Read more
Page 1 of 43 1 2 43