Eskenzi PR ad banner Eskenzi PR ad banner

Uncategorized

Charlie Ciso comic

Dr. Edward Amoroso of TAG Cyber and Rich Powell, famed Mad Magazine illustrator, have teamed up to deliver a light-hearted look at our current working from home culture through the eyes of a caricatured cybersecurity specialist: Charlie Ciso. The book’s protagonist is based on the CISO (Chief Information Security Officer) job role who, “is the person who’s blamed if a company gets hacked”. This delightful book offers tips, tricks and amusing anecdotes that are sure...

Read more
Work From Home

By Angel Duan, Marketing and Communications specialist at OneLogin  The security industry, like every other vertical on earth, is adjusting to the new normal ushered in my the global Covid-19 pandemic, and the waves of home working that it has ushered in. In many ways, the culture of remote working which the security industry has fostered for years means we are one of the better positioned industries for this change in culture. However, it doesn’t mean that we...

Read more
security awareness

KnowBe4 has launched a new feature to its PhishER product called PhishRIPTM, which helps security professionals remove, inoculate and protect against email threats faster.    Technical controls do not filter out all of the malicious emails that come into a user’s inbox. Various research has shown that phishing, spam and malware attachments still make it through email filters. Mimecast notes filters are missing 12% of unwanted emails. According to research by the University of Plymouth in the UK, 75% without links and 64% with links of potential phishing messages made it...

Read more
mobile

This week, the UK government was given the green light to collect mobile data of British citizens to try and bring a halt to the spread of the coronavirus. While many may see this as a breach of privacy, the independent privacy watchdog, the Information Commissioners Office (ICO) have granted permission for this to go ahead. Initially, the government had enquired about leveraging the data from mobile phones to observe and track that the public...

Read more

Citizen Lab, a research group within the University of Toronto, has been able to drive a proverbial truck through the encryption used by video conferencing app Zoom. In a report where the group said the video platform was not suitable for sharing secrets nor government or business use, Citizen Lab found Zoom has been rolling its own encryption scheme as part of a custom extension to the real-time transport protocol. Further, instead of using AES-256...

Read more
DomainTools Logo

As one of the largest global defense companies, L3Harris provides mission-critical solutions to connect and protect the world, serving customers in more than 130 countries. Given the nature of the company’s industry, L3Harris faces numerous facets of cybersecurity threats from advanced adversaries and nation states. The company’s 24x7 computer security incident response team (CSIRT) analysts operate in a highly advanced security atmosphere that is continually growing more complex. Devin McLean, SOC Manager and IRT Engineer...

Read more
gurucul-cybersecurity

According to a report released today by Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, 65 per cent of nearly 300 international cybersecurity professionals surveyed at RSA Conference 2020 admit to having accessed company documents that have nothing to do with their job role.   The survey was conducted to gauge how common insider threat behaviour is among IT security professional who are most attuned to the cyber threats facing organisations. Insider...

Read more
VPN

  The use of remote access technologies like RDP (Remote Desktop Protocol) and VPN (Virtual Private Network) has skyrocketed 41% and 33%, respectively, since the onset of the coronavirus (COVID-19) outbreak. The move comes as a large number of companies have asked staff to work from home, which usually entails connecting to internal intranets via remote access technologies like the two named above. Source: ZD Net

Read more
ransomware

If a layman pictures a cyberattack, the likelihood is they picture a ransomware attack: The screens overcome by a malicious message, locking up systems and demanding payment to a shadowy organisation or individual. This cultural ubiquity does not exist in a vacuum: Where other forms of cybercrime have gone in and out of fashion based on new attack techniques or changing defensive landscapes. Below, some of the most respected security professionals working today wax lyrical...

Read more
Face Mask

By Rita Selvaggi, CEO of ActivTrak The global reach of the coronavirus has elevated the discussion around the need for “social distancing” and working remotely to avoid spreading the infectious virus. Global companies like IBM, Goldman Sachs, and PwC are asking employees to work from home, as are smaller organisations, such as Seattle-based online payment company Stripe. As organisations consider having employees work from home on a more massive scale, it’s important to recognise that...

Read more
Page 15 of 17 1 14 15 16 17