#MIWIC2024: Melissa Chambers, CEO and Co-Founder of Sitehop
IT Security Guru
by Charley Nash
17h ago
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are written in their own words with minor edits made by the editor for readability and where relevant, supplemented with additional commentary by their nominator. In 2024, the awards were sponsored by BT, Think Cybersecurity Ltd. and Plexal ..read more
Visit website
ACDS Launches Revolutionary OBSERVATORY Solution: Redefining Attack Surface Management
IT Security Guru
by Guru Writer
17h ago
Advanced Cyber Defence Systems (ACDS) has unveiled its groundbreaking Attack Surface Management (ASM) solution: OBSERVATORY. Engineered with a comprehensive three-pronged approach—Discovery, Validation, and Insight—OBSERVATORY offers an unparalleled level of network security.  As the number of internet-connected devices explodes, organisations struggle to keep track and secure them before attackers strike. Shockingly, surveys show 69% of companies have been hit by cyberattacks stemming from unidentified or unmanaged internet-facing assets. To address this critical challenge, ACDS has crea ..read more
Visit website
UK’s Cydea introduces new way to quantify risk management
IT Security Guru
by Guru Writer
3d ago
Cydea, the cyber risk management provider, has announced the Cydea Risk Platform, set to quantify threats in financial terms to businesses, allowing them to visualise the consequences of different business security-related scenarios. By giving a monetary value to risks and cyber threats, the company says its new platform is designed to enhance Board-level communication, speed up decision-making, optimise investments and foster collaboration across all stakeholders. This includes business leaders, CISOs, IT teams and security professionals to prioritise and reduce cybersecurity risks to the bus ..read more
Visit website
Report Reveals Healthcare Industry is Disillusioned in its Preparedness for Cyberattacks
IT Security Guru
by The Gurus
3d ago
Kroll, the leading independent provider of global risk and financial advisory solutions, has released the State of Cyber Defense: Diagnosing Cyber Threats in Healthcare report, exposing the healthcare industry’s disillusionment in terms of its cyber maturity. The research reveals that over a quarter (26%) of healthcare businesses have immature cybersecurity processes yet nearly 50% believe their processes are ‘very mature’. Despite this high sense of self-confidence, only 3% of healthcare organizations surveyed actually have mature cyber processes in place. Twenty-eight percent of healthcare o ..read more
Visit website
Goldilock Partners with organisation behind NATO’s largest cyber defence exercise
IT Security Guru
by The Gurus
3d ago
Goldilock, the British cybersecurity startup behind a unique physical network isolation solution, has partnered with CR14, a cyber defence organisation established by the Estonian ministry of defence and host of NATO’s operative Cyber Defence Centre of Excellence (CCDCOE), to conduct testing activities with the aim of increasing the resilience of critical national infrastructure (CNI). Testing will occur under the banner of NATO’s Defence Innovation Accelerator for the North Atlantic (DIANA), a programme designed to equip governments and businesses of member countries with the skills and knowl ..read more
Visit website
Police apprehend global cyber gang implicated in large-scale fraud
IT Security Guru
by The Gurus
3d ago
The Met Police, a long with a host of other global law enforcement agencies, have dismantled a criminal gang that used a technology service to facilitate fraudulent text messages, leading to theft from victims. The scam primarily targeted younger individuals familiar with the internet. The technology service, LabHost, aided scammers in sending deceptive messages and directing victims to fake websites resembling legitimate online payment or shopping services. The criminals obtained identity information, including card numbers and Pin codes, resulting in significant financial losses. Though the ..read more
Visit website
Flyfish Review – How Reliable are this Company’s Payroll Management Solutions?
IT Security Guru
by Daniel Tannenbaum
6d ago
Running a business in today’s competitive landscape can be tough, especially if you want to expand internationally. Doing it alone can be overwhelming, which is why companies like Flyfish can be invaluable. They specialize in corporate payroll solutions and offer a range of financial solutions to support your growth. Choosing this service means gaining access to various financial automation tools designed to simplify your operations.  From streamlining payroll processes to managing international transactions, Flyfish offers a comprehensive suite of services that have the potential to meet ..read more
Visit website
Keeper Security Offers Built-In Passphrase Generator to Strengthen Security
IT Security Guru
by Guru Writer
6d ago
Today Keeper Security have announced the addition of a passphrase generator to Keeper Web Vault, with support on mobile and for the browser extension coming soon. The release also includes an update to the existing password generator which provides users with new options to meet specific password requirements. In addition to being able to include uppercase letters, numbers and symbols, users can now select specific symbols to include or omit, based on the requirements of the website they’re creating the password for. Strong passwords are essential for protecting sensitive information in today ..read more
Visit website
Human Risk: An Organisation’s Biggest Problem and Greatest Opportunity
IT Security Guru
by The Gurus
6d ago
Organisations often lean on the ‘People, Process, and Technology’ (PPT) framework as a way of demarcating value streams and driving action. When managed well, the triad works in unison to ensure a comprehensive and layered approach to defence. But what happens when one pillar is weaker than the others? Human risk is incurred by the compromising behaviours of those inside the organisation, both accidental and purposeful. This risk is realised in various ways, from data leakage and operational inefficiencies, to blackmail, fraud, and ransomware. The Verizon 2023 Data Breach Investigations Report ..read more
Visit website
Pentest People Becomes the First Leeds-based Cybersecurity Company to Achieve NCSC’s Cyber Advisor (Cyber Essentials) Accreditation
IT Security Guru
by The Gurus
1w ago
Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it is the first Leeds-based cybersecurity company to become a qualified and approved Cyber Advisor (Cyber Essentials) on the NCSC’s Cyber Advisor scheme. Developed in partnership with IASME, the scheme simplifies the process for organisations embarking on their cybersecurity journey, ensuring they can readily access the expertise and guidance provided by certified professionals. Introduced at CyberUK in Belfast last year, the Cyber Advisor scheme is designed for small and medium-sized organ ..read more
Visit website

Follow IT Security Guru on FeedSpot

Continue with Google
Continue with Apple
OR