Eskenzi PR banner ad Eskenzi PR banner ad

Security News

Cybersecurity Robustness

Over a quarter (27%) of enterprise IT departments must wait at least a month before they can install vital security updates. That’s according to a new ‘State of Software Delivery’ report from enterprise content delivery company Kollective, which examines the software testing and distribution bottlenecks throughout large organisations in the US and UK. Kollective’s report, which incorporates research from 260 IT managers, leaders and decision makers, highlights how the network security of UK businesses is...

Read more

With Operational Technology (OT) attacks on the rise, Nozomi Networks and IBM earlier this week announced that they have teamed up to bring industrial organizations around the world easier access to deep OT network visibility and continuous threat detection. The news follows recent warning from various bodies – including the UK’s NCSC and the US’ DHS and FBI of an increased treat to critical infrastructures  which could potentially cause damage far beyond the obvious economic...

Read more

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? When it comes to defending from cyberattacks, enterprises need all the...

Read more

If you are at the water cooler muttering “But that’s EXACTLY the graph they asked for.” Enter SIN#1… “Get me a plot of x versus y, colour-coded by z!” They sounded so sure when they asked you, so you created what they wanted, showed it to them, and they hated it. Ok, a bit melodramatic. But in my experience, building the metrics people ask for rarely delivers the insight they want. Why? Often, when someone...

Read more
Security Serious virtual webinars

The data protection and security landscape is all set for change next year with the new EU General Data Protection Regulation (“GDPR”).  There will be regulatory burdens, but you can also use GDPR  to bring some focus on what you do and improve your security stance. If you’re serious about security, GDPR can help. Remember… The new rules are part revolution/part evolution - the new system builds on the current one if you already comply...

Read more
Data Breach Cyber attack code

SolarWinds MSP, a global leader in delivering comprehensive, scalable IT service management solutions to IT solution providers and MSPs, today published survey findings outlining the preparedness of UK and U.S. businesses in dealing with cybersecurity breaches. The report reveals that businesses are gravely optimistic about their ability to deter and cope with malicious attacks, despite the majority experiencing a breach over the last year and nearly one-fourth experiencing more than 10. The potent combination of...

Read more

(ISC)2, an international non-profit membership association, and Learning Tree International (OTCQX:LTRE) today announced a global agreement to enhance development of the professional cybersecurity practice around the world. (ISC)2 certifications will now be recognised within Learning Tree’s proprietary course library and provided within the commercial training frameworks it maintains for major organisations, including the NATO Communications and Information Agency (NCI Agency). The collaboration broadens access to the best cybersecurity practices, knowledge, and principles documented over 28...

Read more

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defences at growing risk of cyber-attack. Increasingly, customers are playing an important role in highlighting security incidents, with a quarter (24 per cent) of financial institutions saying that some of the threats they faced in 2016 were identified and reported to them by a customer. According to the Financial Institutions Security Risks...

Read more

By Chris Dye, VP Marketing and Communications, Glasswall Trump, Brexit and the lingering after-shocks of the credit crisis – banking in Europe is under heavy scrutiny at the moment as it copes with all the pressure.  Yet the wise heads concerned about the resilience of the banking system are also now focusing on cyber-security, with much discussion of how to use testing to prevent disasters. Hardly surprising after the central bank of Bangladesh lost $81...

Read more

Targeted attackers are using an increasingly wide range of deception techniques to muddy the waters of attribution, planting ‘False Flag’ timestamps, language strings, malware, among other things, and operating under the cover of non-existent groups, according to a paper presented at Virus Bulletin by Kaspersky Lab security researchers Brian Bartholomew and Juan-Andres Guerrero-Sade. The identity of the group behind a targeted cyber-attack is the one question everybody wants answered, despite the fact that it is...

Read more
Page 23 of 24 1 22 23 24