Eskenzi PR ad banner Eskenzi PR ad banner

Security News

Targeted attackers are using an increasingly wide range of deception techniques to muddy the waters of attribution, planting ‘False Flag’ timestamps, language strings, malware, among other things, and operating under the cover of non-existent groups, according to a paper presented at Virus Bulletin by Kaspersky Lab security researchers Brian Bartholomew and Juan-Andres Guerrero-Sade. The identity of the group behind a targeted cyber-attack is the one question everybody wants answered, despite the fact that it is...

Read more

The hunt is on for the UK’s best cyber talent to represent the country in the prestigious European Cyber Security Challenge 2016 competition later this year. Cyber Security Challenge UK is looking for 10 candidates; aged 15-29, that have an outstanding aptitude for codebreaking, social engineering and digital forensics to compete against the best amateur talent that Europe has to offer. The European Cyber Security Challenge has been developed in response to the growing popularity of cyber security challenges across the continent. These challenges have proven...

Read more

Neustar, Inc. (NYSE: NSR), a trusted, neutral provider of real-time information services, today announced that the company has experienced rapid adoption – 36% growth from 2014 to 2015 - of its cyber security technology by European retail clients, with brands such as Funky Pigeon, All Saints and Permanent TSB securing and optimising their web presence with Neustar. In the run up to busy seasonal shopping days such as Easter and Father’s Day, Neustar expects this...

Read more

When? 28th January 2016 - International Data Privacy Day Free registration HERE Over the years, risk mitigation efforts have been focused primarily on preventive measures. Although prevention is a necessary component of a mature security program, it is no longer sufficient. The modern attacker is persistent, motivated, well-funded and adept at findings ways into an organization and taking that organization's most sought-after data. To counter this new threat landscape, a paradigm shift is underway in...

Read more
Page 27 of 27 1 26 27