DTX Manchester DTX Manchester

Security News

World and data

Jan Karremans, Director of Sales Engineering at EnterpriseDB Disruption has come to the role of the database administrator (DBA). Automation is eating up tasks typically completed by a DBA – and the technology is evolving to become ever smarter, ever more capable. This automation has sparked concern that humans will inevitably become redundant in running databases.  Already, cloud services have threatened to render the role obsolete. Now, with automation infiltrating more and more areas of...

Read more
Robot playing piano

This week’s question: What does automation mean for IT security teams?  What automation primarily means is that teams now have the chance to scale their tasks to meet the needs of the business. Nowadays, given that vulnerabilities are discovered on a daily basis, organisations need tools that can keep track of these weaknesses as these are made public and patches become available.   The great strategic advantage of using an automation tool for vulnerability management is the frequency at which it allows IT...

Read more

With Halloween fast approaching, it’s a great time to discuss some of our favourite things in life: the creation of chocolate peanut butter cups and what these can teach us about phishing. Hard to imagine a time when before the “age of the cup” because there are many that never got to know the delicious glory that accompanies the unification of chocolate and peanut butter. Prior to that time, people walked around in total ignorance...

Read more
Working from home

By Stuart Sharp, VP of solution engineering at OneLogin According to predictions from the Office of National Statistics, 50% of the UK workforce is expected to be working remotely by 2020. Many organisations have been preparing for this eventuality for many years, as can be seen from the increased uptake of ‘working from home policies’. This is no surprise considering the advancements in technology and the growing expectation of flexible working hours from the modern...

Read more
Anatomy of an Advanced Persistent Threat

By Tarik Saleh, Senior Security Engineer at DomainTools Advanced Persistent Threats are long term patterns of network exploitation that go undetected for extended periods of time and are usually aimed at high profile targets such as governments, higher education institutions, political activists, and companies. They are often motivated by economic, political, and financial reasons, and the attacks tend to be highly targeted, resourceful, and risk tolerant.   The typical APT involves several phases:   Infiltration/Initial compromise:  This...

Read more

BlackBerry Limited (NYSE: BB; TSX: BB) today announced the creation of BlackBerry Advanced Technology Development Labs (BlackBerry Labs), a new business unit operating at the forefront of research and development in the cybersecurity space. Led by CTO Charles Eagan, BlackBerry Labs will include a team of over 120 software developers, architects, researchers, product leads and security experts, each working toward the common goal of identifying, exploring and creating new technologies to ensure BlackBerry is on the cutting edge of security innovation. The rise of the...

Read more
Doordash Review

Food delivery company, DoorDash, has confirmed it was hit by a data breach which exposed the data of close to 5 million customers, delivery people and partners. The breach took place in May of this year, and it's unclear why it has taken DoorDash so long to reveal the details. According to a spokesperson for DoorDash, the breach took place via a third party provider - who was not named - and affected users who...

Read more
OneLogin Security industry

With nearly two-thirds (65%) of IT professionals don’t check employee credentials against common password lists, OneLogin, has developed the industry-first solution, Shield, designed to combat the top source of data breaches and emerging threat vectors: password reuse. Shield, the Google Chrome browser extension further grows OneLogin’s existing threat capabilities by protecting enterprises against password reuse, identity reuse, weak password practices and phishing. “Time and again, end-user behaviour—specifically password reuse—emerges as the primary source of data...

Read more
Page 2 of 24 1 2 3 24