The latest State of API Security Report by Salt Security has highlighted the ongoing challenges faced by organisations in securing their application programming interfaces (APIs). The Salt Labs State of API Security Report Q1 2025 draws on survey responses from…
Category: IT SECURITY GURU
How to Protect Your Digital Identity While Gaming Online
Playing games online provides entertainment but exposes you to specific dangers during gameplay. Hackers and scammers specifically target your personal data, payment specifics, and gaming account information. Cybercriminals steal money and account credentials through phishing attacks, malware, and unsecured systems.…
Cybersecurity Leaders Convene in Belfast to Tackle Evolving Digital Threats
Cybersecurity professionals from across Northern Ireland gathered at Titanic Belfast on February 13 for Check Point Software‘s second Cyber Leader Summit, a high-profile event aimed at strengthening Ireland’s digital defences. The summit brought together government officials, business leaders, and security…
ACDS Unveils New Updates to EASM Platform, Enhancing Security For Enterprises
Advanced Cyber Defence Systems (ACDS) has unveiled various updates to its EASM tool, Observatory. Its new capabilities include an ability to monitor for leaked AWS access and secret keys, as well as a new detection feature for software supply chain…
Keeping DEI on the Agenda: Most Inspiring Women in Cyber Award Organisers Set Panel Topic
Eskenzi PR, organisers of The Most Inspiring Women in Cyber Awards, are proud to announce the theme of this year’s event panel discussion: Keeping DEI on the agenda: progressing, not regressing. The panel topic, informed by ideas submitted by nominators,…
Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour
The common maxim in cybersecurity is that the industry is always on the back foot. While cybersecurity practitioners build higher walls, adversaries are busy creating taller ladders. It’s the nature of the beast. A prime example is multi-factor authentication (MFA),…
How Safe Are Online Entertainment Platforms?
The shift towards online entertainment services in the US can be explained by the proliferation of mobile devices and improved internet access. It is estimated that more than 97% of the US population currently has online access, with 96% owning…
Bridewell and I-TRACING Form Strategic Partnership
Today, I-TRACING and Bridewell, have announced a strategic partnership to create a strategic partnership to create the leading independent European cyber security services provider. The partnership is backed by the founders and managing partners of I-TRACING—Theodore Vrangos, Michel Vujicic, and…
How Secure Are Gaming Transactions: Crypto, Credit Cards, and Wallet Apps Compared
In a consumer survey toward the end of last year, 48% of respondents said they used an e-wallet to pay for items, a jump of 12% from the prior year. This increase suggests a growing desire for safer ways to…
How Q-Day and Security Demands Are Fuelling Cloud Modernisation
The rise of quantum computing is driving the need for cloud modernisation. ‘Q-Day,’ the point at which quantum technology can break current encryption methods in minutes, is looming. With capable quantum systems expected by 2030 and the potential to create…