• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From itsecurityguru.org

UK Public Worried About Global Over Reliance on IT Systems

1 1

A new survey examining public sentiment towards global IT and software providers in the aftermath of the July 2024 CrowdStrike IT outages reveals over three-qua

#News

on Sep 6

From itsecurityguru.org

The GRC Group Strengthens Cybersecurity Offering with Acquisition of Pentest People, Expanding Its Global Reach and Expertise

1 1

The GRC Group ("GRC" or the "Group"), a leading provider of software and tech-enabled services to manage business risks and regulatory compliance, has today acq

#News

on Sep 6

From itsecurityguru.org

AFP Reports Potential Data Breach to French Authorities

0 0

Agence France-Presse (AFP), one of the world's leading news agencies, has alerted French authorities about a possible data breach affecting its systems. The age

on Oct 5

From itsecurityguru.org

Acumen Cyber Achieves CREST Security Operations Centre Accreditation

0 0

Acumen Cyber, an engineer-powered cyber security services provider, has announced its Security Operations Centre (SOC) has received accreditation from CREST, th

on Sep 27

From itsecurityguru.org

Check Point Software Named a Visionary in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

0 0

Check Point Software Technologies Ltd. has announced that it has been recognised as a Visionary in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection

on Sep 27

From itsecurityguru.org

How a RevOps Consultant Can Drive Growth for Your SaaS Business

0 0

As SaaS (Software as a Service) companies grow, maintaining efficiency across revenue-generating teams can become a challenge. Enter Revenue Operations (RevOps)

on Sep 27

From itsecurityguru.org

AI Adoption Set to Unravel Years of Cyber Resilience

0 0

A recent study conducted by e2e-assure, a provider of Threat Detection & Response services, has highlighted a significant discrepancy between the perceived

on Sep 25

From itsecurityguru.org

NormCyber Introduces Digital Risk Protection For Enhanced Cyber Resilience

0 0

At International Cyber Expo 2024, cyber and data risk management specialists NormCyber have introduced its new Digital Risk Protection service. Designed to enha

on Sep 25

From itsecurityguru.org

Gamuda Transforms IT Operations with Cato Networks

0 0

Cato Networks, the SASE leader, today announced that Malaysia-based Gamuda Berhad (Gamuda), an award-winning engineering, property, and infrastructure company,

on Sep 24

From itsecurityguru.org

Community Corner: InClusive InCyber

0 0

Community is exceptionally important to the team at the IT Security Guru. We believe that building community and supporting one another is where our industry th

on Sep 24

From itsecurityguru.org

Beyond A Buzzword: What Resilience in Cyber Really Means

0 0

Resilience, according to Oxford Languages, is:  The capacity to withstand or to recover quickly from difficulties; toughness  The ability of a substan

on Sep 19

From itsecurityguru.org

Check Point Software is Recognised as a Leader in Email Security, Showcasing its Innovative AI-based Threat Intelligence Capabilities

0 0

Check Point have announced that it has been named a Leader in the latest Frost & Sullivan Email Security Radar report. Check Point Harmony Email & Colla

on Sep 19

From itsecurityguru.org

Thoughtworks and ACDS Partner to Advance Cybersecurity Solutions

0 0

Thoughtworks, a global technology consultancy, has formed a strategic partnership with Advanced Cyber Defence Systems (ACDS) to enhance its cybersecurity produc

on Sep 19

From itsecurityguru.org

Keeper Security Appoints James Edwards as Senior Director of Engineering

0 0

Keeper Security have announced the appointment of James Edwards as Senior Director of Engineering. Edwards joins Keeper Security from Delinea, where he worked a

on Sep 19

From itsecurityguru.org

Cyber Warfare: A Growing Concern for the British Public

0 0

A recent survey conducted by OnePoll on behalf of International Cyber Expo has revealed that a significant majority of Britons believe that cyber warfare is the

on Sep 19

From itsecurityguru.org

CREST CAMP: A Catalyst for Global Cyber Security Growth

0 0

CREST is intensifying its efforts to foster growth and development among cyber security service providers worldwide. Through its innovative Cyber Accelerated Ma

on Sep 18

From itsecurityguru.org

‘Cyber Wellbeing Corner’ Returns to International Cyber Expo

0 0

The popular Cyber Wellbeing Corner will return to year’s International Cyber Expo, in partnership with popular wellbeing and productivity platform The Zensor

on Sep 17

From itsecurityguru.org

Real-Time Cyberattack Simulations Take Centre Stage at International Cyber Expo 2024 with CrisisCast

0 0

International Cyber Expo is once again teaming up with CrisisCast, to deliver their renowned immersive demonstrator experience, alongside exhibitors at this y

on Sep 13

From itsecurityguru.org

Keeper Security Expands Passphrase Generator Capability to Mobile Devices

0 0

Password management organisation Keeper Security has unveiled the addition of a passphrase generator to the Keeper platform for mobile. This new feature, now av

on Sep 13

From itsecurityguru.org

Saviynt Launches Innovative Intelligence Suite to Transform Identity Security

0 0

Saviynt, a leading provider of cloud-native identity and governance platform solutions, has announced the launch of its highly anticipated Intelligence Suite, w

on Sep 13

From itsecurityguru.org

Post-Quantum Cryptography Coalition Publishes Comparison of International PQC Standards

0 0

The global Post-Quantum Cryptography (PQC) Coalition, which has now grown to more than 125 participating cyber researchers from industry and academia, publishe

on Sep 9

From itsecurityguru.org

INSIDER THREAT AWARENESS MONTH: Are you prepared?

0 1

An insider threat can feel a bit like the plot twist in a spy thriller. You know, the moment when the protagonist realises the enemy is not just at the gates bu

on Sep 3

From itsecurityguru.org

The six most dangerous new threats security teams need to know about

0 1

The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities,

on Sep 3

From itsecurityguru.org

What To Look For When Buying Business Phone Systems For Your Company

0 0

Choosing the right business phone system is a critical decision for any company. A good phone system not only ensures effective communication within your team b

on Aug 29

From itsecurityguru.org

Chemical Solutions Org Reduces the Time to Integrate Acquired Companies by 80% with Cato SASE Cloud Platform

0 0

SASE organisation Cato Networks has announced that Element Solutions Inc (ESI), the $2.3 billion provider of specialty chemical services, has adopted the Cato S

on Aug 27

From itsecurityguru.org

How Immigration Can Solve America’s Cybersecurity Shortage

0 0

The U.S. is facing a critical shortage of cybersecurity professionals, a challenge that is not only growing but also poses a significant threat to national secu

on Aug 23

From itsecurityguru.org

Cybereason Unveils SDR Data Ramp Program: Analyse and Detect Threats in 1TB of Log Data for 90 Days

0 0

Cybereason has launched its revolutionary SDR Data Ramp Programme with Observe. This innovative initiative allows new customers of Cybereason's Next Gen SIEM De

on Aug 23

From itsecurityguru.org

AI-powered cyber threats are too overpowering for over 50% of security teams - IT Security Guru

0 0

According to research from Absolute Security, over half (54%) of Chief Information Security Officers (CISOs) feel their security team is unprepared for evolving AI-powered threats. The findings were uncovered in the Absolute Security United Kingdom CISO Cyber Resilience Report 2024, which...

on Aug 16

From itsecurityguru.org

New Threat Report from Cato Networks Uncovers Threat Actor Selling Data and Source Code from Major Brands - IT Security Guru

0 0

This week, SASE pros, Cato Networks have published the Q2 2024 Cato CTRL SASE Threat Report, which provides insights into the threat landscape across several key areas: hacking communities and the dark web, enterprise security and network security. The report found that threat actors are selling...

on Aug 14

From itsecurityguru.org

New Post Quantum Cryptography Standards Poised to Revolutionize Cybersecurity - IT Security Guru

0 0

The National Institute of Standards and Technology (NIST) has officially published its highly anticipated Federal Information Processing Standards (FIPS) for post-quantum cryptography (PQC). This significant development will affect a broad range of entities, including financial institutions and...

on Aug 13

From itsecurityguru.org

Kicking cyber security down the road can come back to bite you - IT Security Guru

0 0

The consequences of a successful cyber attack can be disastrous. From substantial financial loss to significant reputational damage, they can lead to untold operational disruption. Yet despite the clear and present danger, some businesses continue to deprioritise cyber security, with a...

on Aug 13

From itsecurityguru.org

How to spot phishing in the age of AI - IT Security Guru

0 1

Since the rise of generative AI in late 2022, a lot has been written about the impact of these tools on cybersecurity. Over $1.1 billion was made in ransomware payments in 2023 alone - and the harsh reality is that cybercriminals, now fuelled by AI technologies, are becoming increasingly...

on Aug 12

From itsecurityguru.org

What skills can cyber security experts develop to adapt to AI and quantum computing? - IT Security Guru

0 0

A career in cyber security is incredibly rewarding. Each day practitioners are met with new challenges that test their problem solving and critical thinking skills. It rewards creativity and can make a tangible impact on a business, its customers and society. High levels of demand for cyber...

on Aug 12

From itsecurityguru.org

NIS2 Directive in the EU: An imminent deadline, insufficient preparation - IT Security Guru

0 0

Dr. Martin J. Kraemer, ​Security Awareness Advocate​ at Knowbe4, gives his advice on where to organisations can start to act now with the impending NIS2 regulation While EU member states must introduce the Network and Information Systems Directive 2022 (NIS2) into their national law by October...

on Aug 8

From itsecurityguru.org

European IT Professionals Want Training on AI, Poll Finds - IT Security Guru

0 0

New research conducted by ISACA found that 62% of people believe that AI will have a positive impact on audit/assurance in the next year - the highest number compared to other areas like risk, compliance, security, IT strategy/governance, and privacy. ISACA's 2024 AI Pulse Poll also found that...

on Aug 7

From itsecurityguru.org

Women in CyberSecurity (WiCyS) Announces 5th Annual Security Training Scholarship - IT Security Guru

0 0

Women in CyberSecurity (WiCyS) have announced the 5th annual Security Training Scholarship (STS) Program in partnership with the SANS Institute. This initiative, made possible by WiCyS Tier 1 Partners and Premier Supporters such as Craig Newmark Philanthropies, the Center for Internet Security...

on Aug 7

From itsecurityguru.org

Expert Insight: Cyber Security Resilience Act: A game-changer for industry standards - IT Security Guru

0 0

For the IT Security Guru, Chris Dimitriadis, Chief Global Strategy Officer at ISACA, explores the UK Government's proposed Cyber Security Resilience Act. As King Charles III read out the new Labour government’s plans at the State Opening of Parliament, our industry breathed a sigh of relief at...

on Aug 7

From itsecurityguru.org

Contrast Security Introduces ADR to Help Organisations Combat Zero Days and Secure Applications from Within - IT Security Guru

0 0

While many organisations can defend against published application vulnerabilities, they often neglect to build security into the application production process. This leaves the door wide open for vulnerabilities to be exploited by the adversaries. In fact, zero-day attacks are on the rise:...

on Aug 7

From itsecurityguru.org

Masterclass in CIAM for Insurance: Balancing Security, Experience, and Consent - IT Security Guru

0 0

The insurance industry is experiencing a significant transformation fuelled by the ubiquity of digital technologies. As these solutions gain traction in this sector, they add complexity to a regulatory landscape that insurance firms need to navigate, especially when it comes to Customer Identity...

on Aug 7

From itsecurityguru.org

International Cyber Expo Announces Global Cyber Summit Theme: Resilience - IT Security Guru

0 0

Nineteen Group, organisers of International Cyber Expo, have announced the programme for the 2024 Global Cyber Summit, curated by the Security Awareness Special Interest Group (SASIG) and sponsored by Dataminr, Threatlocker, and e2e-Assure. The summit, set to take place at Olympia London on the...

on Aug 6

From itsecurityguru.org

Salt Security Enhances API Platform with AI-Powered Insights - IT Security Guru

0 0

API security is becoming an increasingly more prominent discussion for security teams. Notably, API security incidents have more than doubled within the past 12 months, according to recent research. The research also found that API usage is rapidly accelerating, with two-thirds now managing over...

on Aug 6

From itsecurityguru.org

KnowBe4 establishes 6th August as National Social Engineering Day to honour late Kevin Mitnick - IT Security Guru

0 0

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has announced today as the first established National Social Engineering Day, to be observed annually on August 6th. This new national day, officially recognised by the National Day...

on Aug 6

From itsecurityguru.org

6% of All Published CVEs Have Been Exploited in the Wild, Report Finds - IT Security Guru

0 0

Research from earlier this year revealed a worrying uptick in cyberattack volume in the past 24 months, with over a third (36%) of organisations admitting to experiencing three or more data breaches in this time frame. With attack volume increasing, one thing is called into question time and...

on Aug 1

From itsecurityguru.org

Bridging the skills gap to build a secure future for the cloud - IT Security Guru

0 0

Today, the cloud is ultimately the engine driving the future of many businesses. This exciting shift, however, faces a major hurdle: a lack of skilled professionals to navigate its complexities. This talent gap not only stalls innovation but also leaves your companies exposed to serious security...

on Jul 31

From itsecurityguru.org

HealthEquity Data Breach Compromises Customer Information - IT Security Guru

0 0

HealthEquity, a leading provider of health savings account (HSA) services, has announced it suffered a data breach recently, resulting in compromised customer protected health information (PHI). It is understood the breach was detected on March 25, 2024, after abnormal activity was flagged from...

on Jul 31

From itsecurityguru.org

Accenture and SandboxAQ Expand Cybersecurity Partnership - IT Security Guru

0 0

Today, Accenture (NYSE: ACN) and SandboxAQ have announced that they are expanding their partnership to address the critical need for enterprise data encryption that can defend against current data breaches, as well as future AI and quantum threats. Together, Accenture and SandboxAQ are helping...

on Jul 30

From itsecurityguru.org

People Overconfident in Password Habits, Overwhelmed by Too Many Passwords - IT Security Guru

0 0

New research by Keeper Security has revealed some worrying trends and misunderstandings when it comes to password best practices and overconfidence in cyber knowledge. The research found that, while 85% of respondents believe their passwords are secure, over half admit to sharing their...

on Jul 30

From itsecurityguru.org

Secure, Simple, Superior: The Advantages of Tokenized Payment Cards by Wallester - IT Security Guru

0 1

Technology is advancing rapidly and tokenized payment cards are a part of its evolution. Gone are the days of keying in long card numbers, expiry dates and CVV codes and hoping for the best. Instead, tokenized cards offer heightened security and improved transaction processes for digital...

on Jul 30

From itsecurityguru.org

Security Flaws Found in Hotjar, Potentially Affecting Sensitive Data of Millions Utilising Major Global Brands - IT Security Guru

0 1

New threat research by Salt-Labs, the research arm of API security company Salt Security, has released new research highlighting critical security flaws within popular web analytics provider Hotjar. The company serves over one million websites, including global brands like Microsoft and Nintendo...

on Jul 29