Tag: IT SECURITY GURU

IT Security Responsibilities for Online Start-Ups

In this digital world we live in, online start-ups are emerging rapidly, harnessing the power of the internet to reach global audiences and deliver innovative solutions. However, with the increased digital presence comes an elevated risk of cyber threats.  For…

Protecting our data in a world of rising cyber attacks

In today’s volatile digital climate, the security of workers’ and customers’ data and information, as well as the finances and intellectual property of organizations themselves, continues to be questioned. Data sits at the very heart of the world’s largest companies,…

Blurred lines: Securing the physical and digital sides of business

Understanding cybersecurity can be challenging. Although cyber threats such as data theft and financial fraud represent serious business concerns, physical threats often evoke more fear due to their tangible nature. With the boundaries between physical and digital security becoming increasingly…

Fear and Silence: 50% of Employees Hesitant to Report Security Errors

Despite the growing implementation of security awareness training, recent research indicates that over half of cybersecurity professionals are concerned about security behaviours within their organisations. Key Findings from the Survey A survey conducted by ThinkCyber has revealed significant insights into…

One in ten Brits targeted by scammers this summer

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, has released findings on the increased rate of scams targeting people this summer in the UK. It warns people looking to travel abroad or attend music…

Community Corner: CybAid

Community is exceptionally important to the team at the IT Security Guru. We believe that building community and supporting one another is where our industry thrives, that’s why we’re platforming charities and networks that work within the industry, as well…

Telcos Hit Hardest by Cloud Malware, Report Finds

Telecom companies are being targeted by malicious actors at an alarming rate, according to a new report by Netskope Threat Labs. The report highlights a concerning trend of attackers exploiting popular cloud apps like Microsoft OneDrive and GitHub to deliver…

Defending your ever-changing attack surface

The very elements crucial for a business’s functionality and prosperity are also its greatest vulnerabilities from a cybersecurity standpoint. Emails, files, remote/hybrid work setups, and various devices and tools streamline business operations but also pose significant cybersecurity risks. These areas,…

Why ransomware is still important to business resilience

Ransomware may be an old technique, however, due to increasing levels of digital connectivity, are witnessing a proliferation of ransomware attacks in recent years, which pose significant threats to individuals, businesses, and entire industry sectors industries.   Ransomware, in its current…

Men’s Mental Health Week: Resource Guide

10th – 16th June 2024 is International Men’s Mental Health Week. It may feel like there are too many ‘awareness dates’, however this week is especially important. Men are far less likely to talk about mental health than women (it…

Is Your Business Under Attack From AI?

Artificial Intelligence (AI) is highly innovative but also poses significant risks to all organisations, as shown by the recent high profile hacks at Ticketmaster, Santander and the NHS. This article will delve into how AI can be manipulated by cyber…

Strategies to Manage and Reduce Alert Fatigue in SOCs

The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two…

Elevating threat detection and response to a new level

Cybersecurity platforms have emerged as indispensable assets for threat detection, response and management. They proactively keep tabs on network traffic, user behaviour and system activities to identify and mitigate risks before they escalate into potentially catastrophic breaches. Yet, the efficacy…

5 Tips for Improving Your Business Security

When it comes to data security, you might think of firewalls, encryption, or vulnerability scanning. However, many businesses overlook the role of physical security in safeguarding their card data. However, there are numerous methods for data thieves to gain access…

Everything You Need to Know About Cross-Site Scripting

Cross-Site Scripting (XSS) is a sneaky security flaw that lets attackers inject malicious code into seemingly harmless websites. In this article, let’s dive deep into the world of XSS, exploring its different forms, the kind of damage it can cause,…

Medical Software: Advancements and Security Concerns in 2024

In recent years, the landscape of healthcare has experienced digital transformation just like any other industry. And telemedicine is at the forefront of this transformation. As we navigate through a world where convenience meets necessity, software emerges as the unsung…

5 Ways to Strengthen the Weak Link in Cybersecurity

In the current era, proactive cybersecurity steps are essential to upholding a strong cybersecurity stance. A vital investment worth considering is a vulnerability management platform, also known as an exposure management platform, which can enhance preventive cybersecurity measures for businesses…

What Are the Benefits of Choosing an AI Trading Bot?

Artificial Intelligence (AI) is making headlines in different industries because of its application. The case is no different when it comes to crypto trading. Many AI crypto trading bots are now available in the market that can help traders make…

What Are the Benefits of Choosing an AI Trading Bots?

Artificial Intelligence (AI) is making headlines in different industries because of its application. The case is no different when it comes to crypto trading. Many AI crypto trading bots are now available in the market that can help traders make…

Solaris SE partners with Salt Security

Salt Security, the leading API security company, today announced that Solaris SE, Europe’s leading embedded finance platform, has deployed Salt Security’s API Security Platform to secure the company’s expanding API ecosystem. Solaris’ technology enables businesses to seamlessly provide exceptional financial experiences to their…

Centripetal Expands Portfolio with DNS Offering

Centripetal, the global leader in intelligence powered cybersecurity, today announced that it is expanding its offering to include CleanINTERNET® DNS to pre-emptively safeguard businesses against web-based cyber threats. Unlike other DNS filtering products that rely solely on blocklists, CleanINTERNET® DNS…

Keeper Unveils Revamped Browser Extension

Password pros at Keeper Security have announced the rollout of an upgraded User Interface (UI) for its browser extension – now available across all supported browsers. With a modernised design and simplified process of finding and creating records for users, the…

GDPR Turns Six: Reflecting on a Global Privacy Benchmark

The EU’s flagship data protection law, the General Data Protection Regulation (GDPR), celebrated its sixth anniversary on 25th May ‘24. Since coming into effect in 2018, its stringent requirements for enhanced security controls and data privacy have consistently raised awareness…

Building a diverse and inclusive cyber workforce

At this month’s DTX Manchester, I’ll be taking part in a panel discussion around the importance of inclusion and diversity in cyber recruitment. For far too long cyber security was seen as a man’s sport. Not only did men take…

Public Sector IT is Broken: Turning the System Back On

Today’s IT services within public sector organisations are not adequate for their intended purpose anymore. Security breaches frequently make headlines. Downtime disrupts services and productivity. There is excessive overspending across the UK too. What is worse, all these factors broadly…

Expert Insight: How Diverse Leadership Can Benefit the Security Sector

In today’s business landscape, diverse leadership is essential for driving innovation, improving decision-making, and maintaining a competitive advantage. Historically, STEM sectors have been male-dominated, with strict job descriptions and rigid hiring processes making it difficult for minorities to break into…

CIOs and CFOs, two parts of the same whole

The business boardroom: a machine that drives corporate strategy and shapes the future of the company. Such a force requires cohesion and alignment, but silos still exist today. One of the biggest divides lies between the Chief Finance Officer and…

World Password Day 2024: Try Passkeys!

On this World Password Day, we should all pause and think about how we can adopt passkeys. Passkeys represent a significant industry shift in identity security, moving away from traditional credentials of usernames and passwords to a more secure “no knowledge”…

World Password Day 2024: What are the experts saying?

It’s World Password Day 2024! What’s clear is that passwords and creating and maintaining good password hygiene is still one of the most effective ways to protect businesses. We’ve gathered some insights from cybersecurity experts who have had their say…

Guest Blog: Securing K12 Schools with Centripetal and LANRover

In today’s digital age, where technology is deeply ingrained in our daily lives, ensuring the cybersecurity of our educational institutions has become paramount. K-12 schools are increasingly becoming targets for cyberattacks, highlighting the urgent need for robust cybersecurity measures. With…

Synopsys Introduces Polaris Assist: AI-Powered Application Security Assistant

Synopsys has unveiled Polaris Assist, an innovative AI-powered application security assistant incorporated into the Synopsys Polaris Software Integrity Platform®. Leveraging advanced Large Language Model (LLM) technology alongside Synopsys’ deep knowledge in application security, including robust coding patterns, vulnerability detection rules,…

UK’s Cydea introduces new way to quantify risk management

Cydea, the cyber risk management provider, has announced the Cydea Risk Platform, set to quantify threats in financial terms to businesses, allowing them to visualise the consequences of different business security-related scenarios. By giving a monetary value to risks and…