Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be exploited by cybercriminals when there are issues between the front-end and back-end of websites. If left unresolved, these can result…
Category: IT SECURITY GURU
Salt Security Joins AWS Lambda Ready Program
Today, API security company Salt Security has announced that it has been accepted to the Amazon Web Services (AWS) Lambda Ready Program. Salt now supports and simplifies deployments to AWS Lambda, allowing customers to capture API traffic flowing through serverless environments…
AI-Powered Attacks and Deepfake Technology Fuel Cyberattack Concern
Today, password security pros, Keeper Security have released the key findings from its latest survey about the state of cybersecurity and the burgeoning threats that are keeping cyber professionals up at night. The survey of more than 800 IT security…
Introducing meaningful AI features for information security in 2024
Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. He explains why his company is focused on developing AI tools that deliver benefits over media buzz. There’s been a…
Ransomware Research Reveals Millions Spent Despite Do Not Pay Policies
Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals the majority of companies are paying ransoms and breaking their ‘do not pay’ policies. The research polled from over 900 IT and Security decision-makers, 301 from the…
SAS joins fight against cybercrime as NCRCG National Ambassador
This week, the National Cyber Resilience Centre Group (NCRCG) – a strategic collaboration between the Home Office, policing, academic and National Ambassador partners – has welcomed AI and analytics leader, SAS, on board as a National Ambassador. In taking up…
Navigating the Landscape of Advanced Email Security Threats with Optimism
In the contemporary digital era, email remains one of the most predominant forms of business communication. With its unrivalled efficiency and ubiquity, email bridges gaps between organisations and their global workforce, facilitating seamless collaboration. However, this prevalence has also placed…
Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment
For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure them have existed. Manufacturing, agriculture, critical national infrastructure, and healthcare to name but a few,…
Previous Most Inspiring Women in Cyber Winners: Where Are They Now?
Over the last four years, The Most Inspiring Women in Cyber Awards have celebrated some of most inspirational women from across the cybersecurity industry. From CISOs to students, the awards aim to celebrate everyone, no matter what stage of their…
Data Privacy Day: Privacy budgets expected to decrease in 2024
According to new research from ISACA, two in every five (41%) privacy professionals in Europe state their budgets are underfunded and over half (56%) expect them to decrease this year. Anticipated drops in privacy budgets come despite half (53%) of organisations…