Eskenzi PR ad banner Eskenzi PR ad banner

Opinions & Analysis

What could the API Landscape look like in 2025?

As we step into 2025, the API landscape is undergoing a transformative shift, redefining how businesses innovate and scale. APIs are no longer just enablers of connectivity; they are the architects of ecosystems, powering everything from seamless automation to AI-driven services. The new year will prove to be a pivotal year for the API ecosystem that will shape the space, highlighting trends, challenges, and opportunities that lie ahead and the following are realistic predictions I...

Read moreDetails
Centripetal Expands Portfolio with DNS Offering

The very elements crucial for a business's functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas, where external factors come into play, are the least secure, representing vulnerabilities in your organisation's attack surface.. Adding to the complexity, this surface is constantly changing, evolving with your business and the environment in which...

Read moreDetails
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result in some very dire consequences for any business. The IT Security Guru chatted with Love Andren, Junior Application Security Auditor, Ghostlabs AppSec at Outpost24, to understand more about this threat. IT Security Guru (ISG) -...

Read moreDetails
Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment

For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure them have existed. Manufacturing, agriculture, critical national infrastructure, and healthcare to name but a few, are all industrial verticals which now more than ever have a considered need for cybersecurity controls to protect their Operational Technology (OT) systems and equipment which interact and impact the physical environment. Historically, in a...

Read moreDetails
Labor crunch highlights the cybersecurity gaps in threat intelligence practices

A smart building controls activities such as heating, ventilation, air conditioning, lighting, and security through automated processes. Many smart buildings use Internet of Things (IoT) technology, which means they contain sensors to collect data and software to manage it to reduce energy consumption and environmental effect. The demand for this type of construction will skyrocket in the future years. Recent studies predict that the worldwide smart building industry would reach $127.09 billion by 2027, with...

Read moreDetails

Statistics show that the risks of occupational injuries in the tech sector are lower compared to other industries. A tech career doesn’t sound like something that poses significant risks. So, the question is, should tech businesses be concerned about employees’ health and safety?  The simple answer is yes! Even if the risks are lower, that doesn’t mean they don’t exist at all. Providing a safe work environment is not only beneficial for the employees’ wellbeing...

Read moreDetails
Guest blog: The death throes of the password? Key takeaways from the One Identity Infosecurity Europe survey

By Dan Conrad, AD Security and Management Team Lead at One Identity Authentication is one of the hottest topics in cybersecurity right now. As biometrics, MFA, and a range of other authentication methods continue to threaten the password’s supremacy, we thought it was worth finding out what industry professionals thought about it all. So that’s what we did. At InfoSecurity Europe 2022, One Identity surveyed more than 100 security and IT professionals to get a...

Read moreDetails
Cybersecurity is complex – but it doesn’t need to be costly or complicated

The pandemic tested the business resilience of every organisation. Small and medium sized enterprises (SMEs) had to maximise their digital footprint to keep operational, service their customers and survive. Just as companies are starting to return to some semblance of new normal, another threat is on the horizon. The pandemic has fuelled an increase in cybercrime that shows no signs of abating. Small and medium sized enterprises caught in the cross hairs The speed with...

Read moreDetails
The Inside Man Season 4: The Future of Cybersecurity Awareness Training

Corporate training videos. The words alone make you feel bored. They summon dreary memories of wasted hours, terrible acting and worse storytelling. If I told you that it doesn’t have to be that way, that training videos can be informative, engaging and even exciting, would you believe me? You’d be forgiven if you didn’t. But that’s exactly what KnowBe4’s ‘The Inside Man’ is. For four seasons now, the show has been seamlessly interweaving, believe it...

Read moreDetails
scam

According to the Federal Bureau of Investigation (FBI), online shoppers risk losing more than $53 million during this year's holiday season. Scams ranging from socially engineered emails promising great deals to hard-to-find gifts popping up for sale but never making it to the buyer's address, the festive season is cybercriminals' and fraudsters' favourite time of the year. So, what should consumers do to shop safely? We asked cybersecurity experts what they thought of holiday shopping...

Read moreDetails
Page 1 of 43 1 2 43