Expert Insight: ‘Minding the Gap’: How can we work to make cyber accessible for women?
IT Security Guru
by Guru Writer
18h ago
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female, and this is down from 22% in 2022. To make matters worse, we’re fighting a losing battle against an ever-increasing cyber skills gap. In fact, there’s a shortfall of over 11,000 people to meet the demands of the UK workforce. This issue isn’t exclusive to the UK, however, with ENISA reporting a 300,000 person shortfall in Europe. Plugging that gap is essential to protecting consumers and building digital trust but it needs to be done so thoughtfully and with diversity ..read more
Visit website
Google’s Core Update is ‘Biggest’ Algorithm Update in History
IT Security Guru
by Daniel Tannenbaum
1d ago
Search giant Google is currently undergoing one of its biggest algorithm updates in its history, sources are told. The online search platform which manages more than 8 billion searches per day is doing a significant update to its internal systems which will impact how search queries will be shown, with attention to parasite websites, improved quality rankings and spam policies. The core update as it is known has been processed for around 2 months, starting on 5th March 2024 and ending officially on 5th May 2024, which is shown on the Google Status Dashboard.   Why Does Google Update its A ..read more
Visit website
Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army
IT Security Guru
by Guru Writer
2d ago
Cybersecurity is ‘inclusive’ by nature: no one is exempt from the fallout of the expanding cyber threat landscape. The notion, therefore, that some groups of individuals are offered fewer opportunities to join the cyber industry than others is frankly absurd. ISC2’s latest Cybersecurity Workforce Study gives us a snapshot into the supply and demand of cybersecurity talent – and it’s not good news. While the cyber workforce has grown by 8.7%, the skills gap has increased by 12.6%, which equates to roughly 4 million empty roles. From a DE&I perspective, we have seen gradual improvements; ISC ..read more
Visit website
#MIWIC2024: Melissa Chambers, CEO and Co-Founder of Sitehop
IT Security Guru
by Charley Nash
3d ago
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are written in their own words with minor edits made by the editor for readability and where relevant, supplemented with additional commentary by their nominator. In 2024, the awards were sponsored by BT, Think Cybersecurity Ltd. and Plexal ..read more
Visit website
ACDS Launches Revolutionary OBSERVATORY Solution: Redefining Attack Surface Management
IT Security Guru
by Guru Writer
3d ago
Advanced Cyber Defence Systems (ACDS) has unveiled its groundbreaking Attack Surface Management (ASM) solution: OBSERVATORY. Engineered with a comprehensive three-pronged approach—Discovery, Validation, and Insight—OBSERVATORY offers an unparalleled level of network security.  As the number of internet-connected devices explodes, organisations struggle to keep track and secure them before attackers strike. Shockingly, surveys show 69% of companies have been hit by cyberattacks stemming from unidentified or unmanaged internet-facing assets. To address this critical challenge, ACDS has crea ..read more
Visit website
UK’s Cydea introduces new way to quantify risk management
IT Security Guru
by Guru Writer
5d ago
Cydea, the cyber risk management provider, has announced the Cydea Risk Platform, set to quantify threats in financial terms to businesses, allowing them to visualise the consequences of different business security-related scenarios. By giving a monetary value to risks and cyber threats, the company says its new platform is designed to enhance Board-level communication, speed up decision-making, optimise investments and foster collaboration across all stakeholders. This includes business leaders, CISOs, IT teams and security professionals to prioritise and reduce cybersecurity risks to the bus ..read more
Visit website
Report Reveals Healthcare Industry is Disillusioned in its Preparedness for Cyberattacks
IT Security Guru
by The Gurus
5d ago
Kroll, the leading independent provider of global risk and financial advisory solutions, has released the State of Cyber Defense: Diagnosing Cyber Threats in Healthcare report, exposing the healthcare industry’s disillusionment in terms of its cyber maturity. The research reveals that over a quarter (26%) of healthcare businesses have immature cybersecurity processes yet nearly 50% believe their processes are ‘very mature’. Despite this high sense of self-confidence, only 3% of healthcare organizations surveyed actually have mature cyber processes in place. Twenty-eight percent of healthcare o ..read more
Visit website
Goldilock Partners with organisation behind NATO’s largest cyber defence exercise
IT Security Guru
by The Gurus
5d ago
Goldilock, the British cybersecurity startup behind a unique physical network isolation solution, has partnered with CR14, a cyber defence organisation established by the Estonian ministry of defence and host of NATO’s operative Cyber Defence Centre of Excellence (CCDCOE), to conduct testing activities with the aim of increasing the resilience of critical national infrastructure (CNI). Testing will occur under the banner of NATO’s Defence Innovation Accelerator for the North Atlantic (DIANA), a programme designed to equip governments and businesses of member countries with the skills and knowl ..read more
Visit website
Police apprehend global cyber gang implicated in large-scale fraud
IT Security Guru
by The Gurus
5d ago
The Met Police, a long with a host of other global law enforcement agencies, have dismantled a criminal gang that used a technology service to facilitate fraudulent text messages, leading to theft from victims. The scam primarily targeted younger individuals familiar with the internet. The technology service, LabHost, aided scammers in sending deceptive messages and directing victims to fake websites resembling legitimate online payment or shopping services. The criminals obtained identity information, including card numbers and Pin codes, resulting in significant financial losses. Though the ..read more
Visit website
Flyfish Review – How Reliable are this Company’s Payroll Management Solutions?
IT Security Guru
by Daniel Tannenbaum
1w ago
Running a business in today’s competitive landscape can be tough, especially if you want to expand internationally. Doing it alone can be overwhelming, which is why companies like Flyfish can be invaluable. They specialize in corporate payroll solutions and offer a range of financial solutions to support your growth. Choosing this service means gaining access to various financial automation tools designed to simplify your operations.  From streamlining payroll processes to managing international transactions, Flyfish offers a comprehensive suite of services that have the potential to meet ..read more
Visit website

Follow IT Security Guru on FeedSpot

Continue with Google
Continue with Apple
OR