IT Security Guru
6,714 FOLLOWERS
The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning!
IT Security Guru
2d ago
Running a business in today’s competitive landscape can be tough, especially if you want to expand internationally. Doing it alone can be overwhelming, which is why companies like Flyfish can be invaluable. They specialize in corporate payroll solutions and offer a range of financial solutions to support your growth. Choosing this service means gaining access to various financial automation tools designed to simplify your operations.
From streamlining payroll processes to managing international transactions, Flyfish offers a comprehensive suite of services that have the potential to meet ..read more
IT Security Guru
2d ago
Today Keeper Security have announced the addition of a passphrase generator to Keeper Web Vault, with support on mobile and for the browser extension coming soon. The release also includes an update to the existing password generator which provides users with new options to meet specific password requirements. In addition to being able to include uppercase letters, numbers and symbols, users can now select specific symbols to include or omit, based on the requirements of the website they’re creating the password for.
Strong passwords are essential for protecting sensitive information in today ..read more
IT Security Guru
2d ago
Organisations often lean on the ‘People, Process, and Technology’ (PPT) framework as a way of demarcating value streams and driving action. When managed well, the triad works in unison to ensure a comprehensive and layered approach to defence. But what happens when one pillar is weaker than the others?
Human risk is incurred by the compromising behaviours of those inside the organisation, both accidental and purposeful. This risk is realised in various ways, from data leakage and operational inefficiencies, to blackmail, fraud, and ransomware. The Verizon 2023 Data Breach Investigations Report ..read more
IT Security Guru
3d ago
Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it is the first Leeds-based cybersecurity company to become a qualified and approved Cyber Advisor (Cyber Essentials) on the NCSC’s Cyber Advisor scheme. Developed in partnership with IASME, the scheme simplifies the process for organisations embarking on their cybersecurity journey, ensuring they can readily access the expertise and guidance provided by certified professionals.
Introduced at CyberUK in Belfast last year, the Cyber Advisor scheme is designed for small and medium-sized organ ..read more
IT Security Guru
4d ago
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on this year’s winner of the Paula Brici Cyber Marketeer of the Year Award, which was presented to Laura Reilly for her exceptional work in cybersecurity marketing. It is the first time this award has been given out at the Most Inspiring Women in Cyber.
Nominees for the award were:
Susie Evershed – Corporate Communications Consultant at Secureworks
Korina Kennedy – VP of Communicati ..read more
IT Security Guru
1w ago
Popular wellbeing and productivity platform The Zensory have partnered with renowned speaker Holly Foxcroft, Head of Neurodiversity in Cyber Research and Consulting at Stott and May, and NeuroCyber, the organisation dedicated to growing neurodiversity in the cyber sector through inclusive practices, to form the inaugural Inclusive Cyber Space at this year’s UK Cyber Week, held at Olympia London on April 17th-18th.
The cybersecurity industry faces a double threat: a vast skills gap and a looming burnout crisis. Inclusion and diversity are not just buzzwords – they’re critical solutions. B ..read more
IT Security Guru
1w ago
As we delve deeper as an industry into the intersection of emotional well-being and cybersecurity, it has become more evident than ever before that workplace culture profoundly impacts cyber risk. It is critical we all recognise industry-specific challenges in a cyber-mature manner, so we can effectively support underserved sectors. It is important that we explore the implications of burnout on cybersecurity maturity within the Charity and SME (Small and Medium-sized Enterprises) sectors, to better understand how we can equip them to succeed with their future Cyber capabilities.
Charity
Burnou ..read more
IT Security Guru
1w ago
New research by Hornetsecurity highlights the AI cybersecurity gap affecting UK businesses. Although nearly half (45%) of companies have fallen victim to cyberattacks, 26% are still not using AI to enhance their cybersecurity defences.
The survey, which gathered responses from over 500 C-suite professionals across the UK, reveals that cyber threats are an escalating concern. 85% of respondents acknowledge the increased sophistication of these attacks, largely attributed to AI facilitating the process of threat creation.
Commenting on the findings, Hornetsecurity CEO, Daniel Hofmann, said: “The ..read more
IT Security Guru
1w ago
Companies can level up their cybersecurity defenses – eliminating the skills and knowledge gaps that criminals regularly exploit thanks to Hack The Box’s Cyber Performance Center.
Hack The Box’s Cyber Performance Center unites individual ability, business management practices, and the human factor in the cybersecurity industry and it is designed to help organizations take a coordinated approach to their cyber readiness, reducing the vulnerabilities created when cybersecurity is siloed or treated as a tick-box requirement.
Its innovative model transcends the limits of traditional cyber training ..read more
IT Security Guru
1w ago
Today, Keeper Security have announced the introduction of Time-Limited Access and Self-Destructing Records, boosting secure access management for businesses. These features address the growing need for robust data protection in today’s fast-paced environment.
Enhanced Security and Compliance
Time-limited access and self-destructing records automatically remove permissions after a set timeframe, minimizing the risk of privilege escalation and unauthorized access. This stricter control simplifies compliance with regulations like SOX, PCI DSS, and HIPAA.
Streamlined Credential Sharing:
Time-Limit ..read more