IT Security Guru https://www.itsecurityguru.org/ The Site for our Community Fri, 06 Oct 2023 14:38:57 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png IT Security Guru https://www.itsecurityguru.org/ 32 32 Lookout Named Mobile Security Solution of the Year by the CyberSecurity Breakthrough Awards Program https://www.itsecurityguru.org/2023/10/06/lookout-named-mobile-security-solution-of-the-year-by-the-cybersecurity-breakthrough-awards-program/?utm_source=rss&utm_medium=rss&utm_campaign=lookout-named-mobile-security-solution-of-the-year-by-the-cybersecurity-breakthrough-awards-program Fri, 06 Oct 2023 14:38:57 +0000 https://www.itsecurityguru.org/?p=50087 Yesterday, Lookout, Inc., the data-centric cloud security company, today announced that its Lookout Mobile Endpoint Security solution has won the “Overall Mobile Security Solution of the Year” award in the 7th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the […]

The post Lookout Named Mobile Security Solution of the Year by the CyberSecurity Breakthrough Awards Program appeared first on IT Security Guru.

]]>
Yesterday, Lookout, Inc., the data-centric cloud security company, today announced that its Lookout Mobile Endpoint Security solution has won the “Overall Mobile Security Solution of the Year” award in the 7th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market.

Remote and hybrid work have blurred the lines between personal and work tasks and the boundaries between the two have become indistinguishable – yet many organisations still struggle to secure an increasingly mobile-centric environment. According to The Global State of Mobile Phishing Report published by Lookout, 2022 saw the highest mobile phishing encounter rate ever, with more than 50% of personal devices exposed to a mobile phishing attack. Lookout estimates the potential annual financial impact of a mobile phishing attack to an organization of 5,000 employees is nearly $4 million.

Lookout Mobile Endpoint Security is the industry’s most advanced mobile threat defence solution to deliver mobile endpoint detection and response (mobile EDR). Lookout provides visibility into mobile threats and state-sponsored spyware, while also protecting against mobile phishing and credential theft that can lead to unauthorized access to sensitive corporate data. The solution analyses telemetry from more than 215 million devices, 269 million apps and more than 500 million web destinations to uncover thousands of new threats each day. Lookout is FedRAMP JAB P-ATO Authorized and available through CDM DEFEND, trusted by enterprise and government customers alike to protect sensitive data, enabling the workforce to connect freely and safely from any device.

“We are honoured to be named the ‘Overall Mobile Security Solution of the Year’ by CyberSecurity Breakthrough,” said David Richardson, Vice President of Product, Lookout. “This is further validation of the ability for the Lookout Mobile Endpoint Security solution to provide organisations with detection, remediation and prevention capabilities across the entire spectrum of mobile risk, allowing them to effectively manage and reduce that risk. With Lookout, organisations can seamlessly integrate mobile security into their existing security and mobile management solutions, ensuring a cohesive and comprehensive security strategy that protects highly sensitive data across the entire organisation.”

The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and many more. This year’s program attracted thousands of nominations from over 20 different countries around the world.

“Lookout Mobile Endpoint Security allows organisations to better understand the extent of their risks by increasing visibility posed by mobile devices across the organization. After all, most organizations don’t have full visibility into how mobile devices within their company process data,” said Steve Johansson, managing director, CyberSecurity Breakthrough. “For most people, their mobile phones are where their personal lives converge with work, increasing the chance of company data ending up in the wrong hands. Congratulations to Lookout for developing a solution that tirelessly protects and secures an organization’s users and their devices, in a mobile-first world.”

 

 

 

The post Lookout Named Mobile Security Solution of the Year by the CyberSecurity Breakthrough Awards Program appeared first on IT Security Guru.

]]>
5 Tips for Choosing the Best Proxy Service Provider https://www.itsecurityguru.org/2023/10/05/5-tips-for-choosing-the-best-proxy-service-provider/?utm_source=rss&utm_medium=rss&utm_campaign=5-tips-for-choosing-the-best-proxy-service-provider Thu, 05 Oct 2023 18:16:47 +0000 https://www.itsecurityguru.org/?p=50083 Selecting the appropriate proxy provider can frequently appear as a challenging endeavor. The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. However, determining the one that aligns with your needs and effectively comparing the various options can be puzzling. In […]

The post 5 Tips for Choosing the Best Proxy Service Provider appeared first on IT Security Guru.

]]>
Selecting the appropriate proxy provider can frequently appear as a challenging endeavor. The swift expansion of the data collection sector has birthed an extensive market brimming with contenders all vying to deliver high quality proxy services. However, determining the one that aligns with your needs and effectively comparing the various options can be puzzling. In this article, we’re going to explore crucial aspects to keep in mind while choosing a proxy provider:

Steer Clear of Dubious or Free Services

Opting for free or dubious services is never advisable as they often neglect security protocols, making you an easy target for hackers. These cyber criminals may record your data, including sensitive details like usernames, passwords, and browsing history, which can be manipulated for various reasons.

Certain services are not clear about their proxy acquisition methods. This becomes particularly important if you’re considering purchasing residential proxies. A service that doesn’t maintain its proxy network and its users could potentially harm your device. Hence, it’s crucial to research online to see if the provider is open about how they acquire proxies.

Free proxies are frequently saturated with users, resulting in slow connection speeds, subpar performance, or even causing you to lose internet access. This could disrupt your online activities, particularly when streaming or downloading content.

Ethics

A dependable US Proxies provider ethically acquires their IP addresses. This is incredibly important when using residential or mobile proxies, which direct internet traffic through actual user devices. Residential proxies provide residential IP addresses that are owned by Internet Service Providers (ISPs). These IPs are given to the ISP customers to gain internet access through the networks of the respective ISPs.

As such, a proxy provider must first obtain permission from a customer of the ISP to rent their unused bandwidth. Leasing this bandwidth involves routing internet traffic via the customer’s devices, necessitating user agreement and installing specific gateway software. A moral provider always adheres to the correct protocols when leasing bandwidth.

Exceptional Customer Support

Even when operations seem to run flawlessly, you may still encounter technical hitches with your proxies. Collaborate with a provider that offers top-notch customer support. The most commendable proxy service provider will maintain a proactive team who are consistently ready to assist you during crises. They should also be prepared to help you comprehend the technical problem and its origin. Verify if your selected proxy service provider extends help around the clock, enabling you to promptly address technical complications irrespective of the hour.

What’s Your Intended Use for the Proxy?

Certain proxy service providers may be more suitable for specific applications than others. For example, if you plan to use the proxy server to bypass geographical restrictions on content, selecting a provider with a broad IP network would be wise. On the other hand, if you’re using a scalping or retail bot, opting for a proxy service provider that prioritizes speed and privacy will help streamline your scalping process.

Buy from Authentic Providers

The internet is rife with various individuals purporting to offer legitimate proxy servers. It’s essential to meticulously research any potential vendor. As an example, you could investigate the company on the internet to examine the reviews left by past customers. 

An abundance of positive reviews should serve as a signal for you to proceed with acquiring the server. One of the most direct approaches to determine a product’s authenticity is through impartial customer remarks. Dealing with a bona fide legal entity is advantageous as it will assume accountability for any complications encountered while utilizing their proxy.

Endnote 

Selecting the optimal proxy provider may require a considerable amount of time, however, it’s an investment that will yield benefits in the future. Ensure your chosen service boasts a properly maintained proxy infrastructure, a comprehensive dashboard, and readily available technical support. Each of these components significantly contributes to the success of your project and ensures seamless access via proxies.

 

The post 5 Tips for Choosing the Best Proxy Service Provider appeared first on IT Security Guru.

]]>
Cybersecurity sector in drive to boost female tech talent https://www.itsecurityguru.org/2023/10/05/cybersecurity-sector-in-drive-to-boost-female-tech-talent/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-sector-in-drive-to-boost-female-tech-talent Thu, 05 Oct 2023 14:34:37 +0000 https://www.itsecurityguru.org/?p=50076 Cybersecurity giants BAE Systems, DarkTrace and GCHQ are on a mission to address the industry’s gender diversity gap by recruiting more female coders during Cyber Awareness Month. Despite cybersecurity being one of the fastest-growing industries in tech, analysis of the latest ONS Annual Population Survey reveals that women make up just 19% of cyber professionals […]

The post Cybersecurity sector in drive to boost female tech talent appeared first on IT Security Guru.

]]>
Cybersecurity giants BAE Systems, DarkTrace and GCHQ are on a mission to address the industry’s gender diversity gap by recruiting more female coders during Cyber Awareness Month.

Despite cybersecurity being one of the fastest-growing industries in tech, analysis of the latest ONS Annual Population Survey reveals that women make up just 19% of cyber professionals in the UK. Yet with an estimated 1.8 million cybersecurity job vacancies at the end of 2023, the industry is also facing a major skills gap.

By partnering with Code First Girls (CFG), the largest provider of free coding courses for women in the UK, all three companies have sponsored almost 200 women to learn how to code. They are currently looking to recruit female coders across roles such as cyber analysts and junior software engineers through the CFG degree, a free, 16-week course.

A recent survey by Code First Girls of more than 1,200 women showed an increasing number are exploring pathways into tech – despite 80% reporting that a career in tech was neither mentioned nor encouraged at school. This includes roles in cybersecurity, with previous applications to GCHQ and BAE Systems’ opportunities being 300% and 420% oversubscribed.

Anna Brailsford, CEO of Code First Girls said: “To keep the UK safe, it is fundamental that the cybersecurity industry places an emphasis on employing more diverse teams to better address the security threats present today, and in the future.

“If we want to make UK security the strongest it can be, it needs to draw on the widest possible range of voices and insights. That diversity of thought is absolutely crucial to protecting the UK and guarding against threats”.

Theresa Palmer, Global Head of Diversity, Equity and Inclusion, BAE Systems Digital Intelligence, said: “It’s well established that a diverse workforce contributes to a high-performing business. With the cyber threat landscape continuing to evolve at pace, it has never been more important to embrace diversity and inclusion in the UK’s cybersecurity industry. This is what will ensure we have the range of skills and experiences required to stay ahead of cyber criminals.

“We are proud to be working with industry leading specialist organisations such as Code First Girls to bring through the next generation of female talent that will help secure our future businesses and society.” 

Hanah-Marie Darley, Head of Threat Research at Darktrace, said: “To help free the world of cyber disruption, we must make organisations more resilient in the face of growing, complex threats, accelerated by the increasing adoption of AI by bad actors. Talent is key to making this a reality. Diverse people and perspectives will help us find solutions to the challenges we will face today and tomorrow, so it is vital that we share our expertise and insight to build the next generation of technologists. That’s why we’re excited to partner with Code First Girls to help more women access the skills and opportunities to succeed in this pivotal time for the cybersecurity industry.”

The post Cybersecurity sector in drive to boost female tech talent appeared first on IT Security Guru.

]]>
JUMPSEC team inspires local primary school children to consider a future career in cyber-security https://www.itsecurityguru.org/2023/10/05/jumpsec-team-inspires-local-primary-school-children-to-consider-a-future-career-in-cyber-security/?utm_source=rss&utm_medium=rss&utm_campaign=jumpsec-team-inspires-local-primary-school-children-to-consider-a-future-career-in-cyber-security Thu, 05 Oct 2023 14:27:18 +0000 https://www.itsecurityguru.org/?p=50072 Acton-based cyber security company, JUMPSEC, recently visited a local primary school to share how its team protects some of the world’s biggest brands from hackers, malware, and other cyber-attacks. As Ealing Borough’s security partner, JUMPSEC has teamed up with the council to collaborate and deliver social value to the community. This kicked off on Friday 22nd […]

The post JUMPSEC team inspires local primary school children to consider a future career in cyber-security appeared first on IT Security Guru.

]]>
Acton-based cyber security company, JUMPSEC, recently visited a local primary school to share how its team protects some of the world’s biggest brands from hackers, malware, and other cyber-attacks.

As Ealing Borough’s security partner, JUMPSEC has teamed up with the council to collaborate and deliver social value to the community. This kicked off on Friday 22nd of September, at Dairy Meadow Primary School in Southall as part of its first careers event of the academic year.

In a world where everything is going digital and children spend increasing amounts of time on the internet at young ages, it has never been more important to make sure they understand the risks online as well as the potential careers available in cyber-security.

The JUMPSEC team explained their roles within the company and the ten and eleven-year-olds were then given the opportunity to quiz them about their roles in the company. They also discussed core values and the skills needed to build a successful company.

Chris Preece, Head of Offensive Security at JUMPSEC explains: “Bringing cyber security awareness and education into schools is essential to help pupils protect themselves and to attract some of them to study cyber security or computing-related subjects in the future. It was a fun afternoon with the students, and I was impressed by their insightful questions. They asked about the challenges of my role, what I like about my job, as well as internet safety in general and how they can better protect themselves online. The children had the opportunity to speak with members of our team from different parts of the business: security, sales, and operations. We are already looking forward to the next school visit.”

Alex Feldman, Assistant Head Teacher at Dairy Meadow added: “We can’t thank the team from JUMPSEC enough for taking time out of their busy schedules. We want all our young people to dream big, but they can only do that if they are exposed to the world of work from an early age. We hope that our children can view cybersecurity as a viable option for future careers.”

Zamil Ahmed, Assistant Director of Commercial Hub at Ealing Council concluded: “A great example of how our approach to social value is working to support Ealing Council residents and communities. Thanks to JUMPSEC, Dairy Meadow Primary School and colleagues for taking part.”

The post JUMPSEC team inspires local primary school children to consider a future career in cyber-security appeared first on IT Security Guru.

]]>
‘No excuses – try harder’: Martha Lane Fox at DTX + UCX Europe challenges tech leaders to double-down on diversity https://www.itsecurityguru.org/2023/10/05/no-excuses-try-harder-martha-lane-fox-and-lineup-at-dtx-ucx-europe-challenges-tech-leaders-to-double-down-on-diversity-and-sustainability/?utm_source=rss&utm_medium=rss&utm_campaign=no-excuses-try-harder-martha-lane-fox-and-lineup-at-dtx-ucx-europe-challenges-tech-leaders-to-double-down-on-diversity-and-sustainability Thu, 05 Oct 2023 11:03:47 +0000 https://www.itsecurityguru.org/?p=50065 Baroness Martha Lane Fox has launched a rallying cry for the tech world to invest in diversity as organisations have “no excuses” not to improve representation in the sector. Speaking from the main stage at DTX + UCX 2023, the Lastminute.com founder headlined a show lineup including ITV journalist Sameena Ali Khan, Meta Group Director […]

The post ‘No excuses – try harder’: Martha Lane Fox at DTX + UCX Europe challenges tech leaders to double-down on diversity appeared first on IT Security Guru.

]]>
Baroness Martha Lane Fox has launched a rallying cry for the tech world to invest in diversity as organisations have “no excuses” not to improve representation in the sector.

Speaking from the main stage at DTX + UCX 2023, the Lastminute.com founder headlined a show lineup including ITV journalist Sameena Ali Khan, Meta Group Director Sophie Neary and ‘People Hacker’ Jenny Radcliffe – and issued a challenge to other firms to “do the work” on diversity.

Fox said that despite the availability of 30,000 female software developers in the tech space – statistics show the sector will never achieve parity at current rates of growth.

Of course, the diversity conversation must go beyond only focusing on gender diversity. “10 million adults still don’t use tech effectively or at all – and that’s directly related to socio-economic groups,” she stated.

At the dawn of a new realm of AI and digitisation, Fox said the industry needs “leaders who are intentful and focused” on diversity and environmental matters for true change, and that the opportunity ahead is great.

“The first trillionaire will be in climate tech,” she told her audience.

“The important thing is for new business leaders to make decisions with purpose.

“I don’t see us having a catastrophic relationship with AI, I think we’ll just become more productive. People’s jobs will change in the sense they will be able to do way more [of the important stuff].”

The subsequent panel titled “Twist and Shout” discussed the importance of a diverse talent pool. with Meta’s Sophie Neary emphasising that organisations “always have a choice”.

“Talent is equally distributed – opportunity is not.

“[But] we can make the change happen. Successful companies are the ones who are optimistic.”

On the same panel, PwC’s Cloud & Digital Lead Warren Tucker pointed out that 40% of business owners didn’t believe their current model would be fit for purpose a few years down the line – and that rapid change across the sector is inevitable.

Adaptation for the new realm will extend to cybersecurity and ethics, it was revealed across the event’s dedicated cybersecurity theatres, with speakers in cyber war and cyber resilience sessions urging firms to enhance their defence systems to combat advanced cyberthreats whilst focusing on the responsible use of AI.

Renowned social engineer Jenny Radcliffe added: “I’m yet to see AI replicate what a human social engineer can do – not that AI isn’t as brilliant as it is terrifying. [But] people are the most unpredictable entity you will ever come across. Feeding off experiential learning from a machine is never going to be as intuitive as a human.”

Meanwhile, Kelsey Hightower, former distinguished engineer at Google (just 100 out of 180,000) expressed the need to make open source software sustainable for the long term and less dependent on enterprise needs.

On the hype around AI, he commented: “You can rub AI on a can opener at the moment and you would get funding. If you are asking if AI is going to take your job, what is your job?

“My mantra: Make influence key, be authentic, and share the credit.”

Across 18 stages – including case studies, panel debates and peer-to-peer roundtables on cloud, networks, cybersecurity, DevOps, software engineering, UC, AI and data, DTX + UCX 2023 also served as a stage for sector achievements. Firms marked the event with the kinds of landmark announcements and product launches that mirrored the fast pace of change and exciting developments that visitors heard from the headline speakers.

DTX + UCX Europe 2023 Content Director Dominie Roberts said: “Bringing the best tech talent under one roof is what we do – and this year we have strived to improve the richness and diversity of our programmes which we are very proud of.

“Businesses are trying to keep their culture, infrastructure and operational design up to speed with the fast pace of tech change – and it is through events like these that tech teams learn how to navigate the latest tools and adopt the kinds of scalable, sustainable and inclusive strategies that will ultimately ensure their success as we enter the next realm.”

As speaker Jon Arnold summarised as the first day of DTX + UCX Europe 2023 wound down: “Occasions like this, where we can all come together to talk about the future, are important.

“We need events like this.”

DTX + UCX Europe 2023 continues with a full lineup today (Thursday 5 October) at the London ExCeL. More information is available online here

The post ‘No excuses – try harder’: Martha Lane Fox at DTX + UCX Europe challenges tech leaders to double-down on diversity appeared first on IT Security Guru.

]]>
Outpost24 Expands Leadership Team by Appointing New Chief Revenue Officer https://www.itsecurityguru.org/2023/10/04/outpost24-expands-leadership-team-by-appointing-new-chief-revenue-officer/?utm_source=rss&utm_medium=rss&utm_campaign=outpost24-expands-leadership-team-by-appointing-new-chief-revenue-officer Wed, 04 Oct 2023 13:01:47 +0000 https://www.itsecurityguru.org/?p=50060 Today, cyber risk management company Outpost24 have announced the appointment of Allan Robertson as Chief Revenue Officer (CRO). Robertson is responsible for overseeing company-wide revenue generation and building an enhanced, integrated go to market approach to accelerate sales and customer growth. The appointment of Robertson as CRO further bolsters the expansion of Outpost24’s leadership team […]

The post Outpost24 Expands Leadership Team by Appointing New Chief Revenue Officer appeared first on IT Security Guru.

]]>
Today, cyber risk management company Outpost24 have announced the appointment of Allan Robertson as Chief Revenue Officer (CRO). Robertson is responsible for overseeing company-wide revenue generation and building an enhanced, integrated go to market approach to accelerate sales and customer growth.

The appointment of Robertson as CRO further bolsters the expansion of Outpost24’s leadership team in order to support the company’s exponential growth and develop long-term strategies that enhance current product offerings. Recently, Outpost24 announced the appointment of Brendan Hogan as their new Chief Strategy Officer. Additionally, Ola Burmark joined the company as CFO.

Robertson is an experienced executive, holding consultant and long-term leadership positions within software sales. In his new role at Outpost24, Robertson will be integral to enhancing the customer experience as the organisation continues its global expansion. Together with other members of the executive team, Robertson will execute corporate strategic plans, focusing on revenue growth and customer expansion, while strengthening and scaling business operations.

“Allan brings a wealth of valuable experience to Outpost24, which makes him a great addition to our expanding revenue team,” Karl Thedeen, CEO of Outpost24. “His proven track record of executive management, sales leadership at significant scale and global customer engagement make him the ideal person to spearhead Outpost24’s go-to-market strategies and revenue generation operation.”

For more than two decades, Robertson has served in executive sales and customer service roles. Before joining Outpost24, he was CRO at Intralinks, a leading Fintech provider of secure file sharing and collaboration technologies, where he gained international experience working across North America, Europe, and Asia. He has also held sales leadership positions at IBM, marketing technology software firm Acoustic and Pirean, a provider of identity and access management solutions.

Regarding his appointment, Robertson said, “I’m delighted to have joined Outpost24 at an exciting time. With the rapid evolution of the IT and cybersecurity landscape, a unified approach to threat exposure management has become mandatory to improve cyber resilience. Outpost24’s ability to combine asset visibility, vulnerability management and pentesting-as-a-service (PTaaS) with advanced threat intelligence and identify and access (IAM) management has proven to be a key differentiator in the market.”

 

 

The post Outpost24 Expands Leadership Team by Appointing New Chief Revenue Officer appeared first on IT Security Guru.

]]>
Keeper Security Becomes a CVE Numbering Authority https://www.itsecurityguru.org/2023/10/04/keeper-security-becomes-a-cve-numbering-authority/?utm_source=rss&utm_medium=rss&utm_campaign=keeper-security-becomes-a-cve-numbering-authority Wed, 04 Oct 2023 10:54:24 +0000 https://www.itsecurityguru.org/?p=50053 Today, password management company Keeper Security has announced that it has been authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). Keeper is the first password management company to join this global effort to identify, define and catalogue publicly-disclosed cybersecurity vulnerabilities. As a CNA, Keeper has the ability to […]

The post Keeper Security Becomes a CVE Numbering Authority appeared first on IT Security Guru.

]]>
Today, password management company Keeper Security has announced that it has been authorised by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). Keeper is the first password management company to join this global effort to identify, define and catalogue publicly-disclosed cybersecurity vulnerabilities.

As a CNA, Keeper has the ability to directly assign CVE IDs and publish CVE records for vulnerabilities discovered in its own source code and vulnerabilities in third-party software discovered by the Keeper team that are not in another CNA’s scope. Keeper can then publish that information via the CVE List, which information technology and cybersecurity professionals around the world use to coordinate their efforts to prioritise and address the vulnerabilities.

Craig Lurey, CTO and Co-Founder of Keeper Security, says: “Becoming a CNA partner highlights our ongoing commitment to the responsible disclosure of potential security issues. Our mission is to provide the world’s most secure and innovative cybersecurity software, and we believe that programs like CVE are a vital component to ensuring the security of all digital products and services people rely on.”

CVE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). CISA uses the CVE List to compile its Known Exploited Vulnerability Catalogue, which organisations use to prioritise remediation of listed vulnerabilities, reducing the likelihood of compromise by known threat actors. The CVE list also feeds into the National Institute of Standards and Technology (NIST) U.S. National Vulnerability Database, which is the government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol. 

Keeper performs quarterly application penetration testing on all of its products and systems with 3rd party penetration testers, including NCC Group and Cybertest. These include red-team style penetration tests of both internal and externally-exposed systems with full source code access.  Keeper has also partnered with Bugcrowd to manage its bug bounty and Vulnerability Disclosure Program (VDP), which rewards ethical hackers for successfully discovering and reporting vulnerabilities, leveraging the hacker community to continuously uphold Keeper’s high security standards.

The post Keeper Security Becomes a CVE Numbering Authority appeared first on IT Security Guru.

]]>
UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached https://www.itsecurityguru.org/2023/10/03/uk-sme-cyber-threat-concerns-on-the-rise-in-last-12-months-as-a-quarter-admit-to-being-breached/?utm_source=rss&utm_medium=rss&utm_campaign=uk-sme-cyber-threat-concerns-on-the-rise-in-last-12-months-as-a-quarter-admit-to-being-breached Tue, 03 Oct 2023 15:07:12 +0000 https://www.itsecurityguru.org/?p=50049 Against a challenging economic backdrop and well publicised cyber-attacks, concerns about cyber threats amongst UK small and medium sized businesses (SMEs) have risen significantly in the last year as they consider the impact on brand, reputation, and revenue. According to new research, nearly four in ten (38%) are more worried about cyber security threats than […]

The post UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached appeared first on IT Security Guru.

]]>
Against a challenging economic backdrop and well publicised cyber-attacks, concerns about cyber threats amongst UK small and medium sized businesses (SMEs) have risen significantly in the last year as they consider the impact on brand, reputation, and revenue. According to new research, nearly four in ten (38%) are more worried about cyber security threats than a year ago, with over a quarter of businesses admitting to some form of security breach.

Research commissioned by Sharp Europe – a major provider of business technology products and services to SMEs across Europe, found that around one third of the businesses had their operations impacted by a cyber security breach. These breaches included phishing (31%), malware (30%), data loss (30%), and computer virus attack (25%).

In addition, nearly a quarter have been subject to password attacks (24%) and cloud security issues (23%). Yet nearly two thirds (61%) lack confidence in their businesses’ ability to deal with and mitigate security risks. Given this, surprisingly three out of five (60%) of UK small businesses say their IT security budget will not be increased this year.

The pan-European research surveyed 5,770 professionals responsible for purchasing IT in their SMEs, on confidence in IT security capabilities and barriers to IT security investment over the next 12 months. It found that losing money, decreased customer confidence, and negative impact on the brand are the top business concerns when it comes to the impact of an IT security breach.

Colin Blumenthal, Vice President, IT Services at Sharp Europe, comments:

“Businesses operate in a complex digital environment, which poses increasing IT security challenges for companies of all sizes. For smaller businesses, without large IT resources, the risks can feel even more daunting. Threats are constantly changing– and trying to identify and prevent them all can leave those in charge feeling concerned, confused, and frustrated.”

“Every business, regardless of size, should do everything they reasonably can to protect their data and ensure their connectivity, whether through networks or devices, is as secure as possible. Seeking expert advice can help ensure the right IT security decisions are being made, a holistic security view is being taken, and that solutions are always up to date.”

Concern is being amplified by issues such as the rise of hybrid working and employees using their own devices. Worryingly, only 53% of SMEs in UK say they have encryption in place, and nearly two thirds (58%) have a strong password policy.

For more insights and advice on cyber security for SMEs, please visit sharp.co.uk.

The post UK SME cyber threat concerns on the rise in last 12 months as a quarter admit to being breached appeared first on IT Security Guru.

]]>
The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals https://www.itsecurityguru.org/2023/10/03/the-state-of-cybersecurity-cyber-skills-gap-leaves-business-vulnerable-to-attacks-new-research-reveals/?utm_source=rss&utm_medium=rss&utm_campaign=the-state-of-cybersecurity-cyber-skills-gap-leaves-business-vulnerable-to-attacks-new-research-reveals Tue, 03 Oct 2023 15:00:40 +0000 https://www.itsecurityguru.org/?p=50046 ISACA, the leading global professional association helping individuals and organisations in their pursuit of digital trust, today launches new research looking at the state of cybersecurity. The research finds that of the cybersecurity professionals who said they were experiencing an increase or decrease in cybersecurity attacks as compared to a year ago, over half (52%) […]

The post The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals appeared first on IT Security Guru.

]]>
ISACA, the leading global professional association helping individuals and organisations in their pursuit of digital trust, today launches new research looking at the state of cybersecurity. The research finds that of the cybersecurity professionals who said they were experiencing an increase or decrease in cybersecurity attacks as compared to a year ago, over half (52%) say they are experiencing more cyberattacks.  

 

Though businesses recognise the increased threat, less than one in ten (8%) of the organisations who complete cyber risk assessments do these monthly while two in five (40%) conduct them annually. The failure to regularly assess cyber risk leaves organisations vulnerable to attacks and increases the risk of breaches going undetected for prolonged periods.  

 

A lack of human resource is contributing to businesses not measuring and testing their cyber defences regularly enough. Almost two thirds (62%) of respondents report that their cybersecurity team is understaffed. Of those organisations with unfilled roles in cybersecurity, 39% are looking to fill entry level positions that do not require experience, university degree, or credentials. Typically, 44% of organisations state that they require a university degree to fill entry level cybersecurity positions when they have them. 

 

Chris Dimitriadis, Global Chief Strategy Officer at ISACA, said: “Our findings show that businesses are still struggling to find the right people with the right skills to manage cybersecurity. With cyberattacks on the rise, if we do not solve these challenges and address the gaps, businesses, ecosystems of supply chains and public sector bodies could be at threat from a lack of vital protection, detection, response and recovery. Businesses do not exist in isolation from their customers or the other organisations within their network, and a cyberattack on one part of the ecosystem can have consequences for everyone else. This is why holistic training is needed towards creating a safer world.” 

 

There are some simple steps businesses can take to tackle the cyber skills gap and improve their cyber resilience. Of those who are already making headway, half (50%) of the organisations surveyed are upskilling non-security staff, 46% are increasing the use of contractors or external consultants, and a quarter (27%) are adopting reskilling programmes.  

 

Cybersecurity professionals believe that hands-on experience in a cybersecurity role (97%), credentials held (88%), and completion of hands-on cybersecurity training courses (83%) are very or somewhat important when determining if a cybersecurity candidate is qualified. 

 

Chris Cooper, member of ISACA’s Emerging Trends Working Group, said: “If businesses are to maintain their cyber resilience in an ever-evolving threat climate, we must encourage and nurture talent in the cybersecurity industry. Employers are looking for people who already have hands-on experience, but we will only enable people to build that experience by creating more entry-level roles and investing in the right training and development for everyone in the industry, from the ground up.” 

 

Jon Brandt, ISACA Director, Professionals Practices and Innovation and Martin Van Horenbeeck, Senior Vice President and Chief Security Officer at Adobe will discuss these findings further in a webinar taking place on 3 October at 17:00 BST. To register, visit  

https://store.isaca.org/s/community-event?id=a334w000005hEsVAAU.  

 

A complimentary copy of the State of Cybersecurity 2023 survey report can be accessed at www.isaca.org/state-of-cybersecurity-2023, along with related resources. Additional cybersecurity resources can be found at www.isaca.org/resources/cybersecurity

The post The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals appeared first on IT Security Guru.

]]>
Threat Hunting with MITRE ATT&CK https://www.itsecurityguru.org/2023/10/02/threat-hunting-with-mitre-attck/?utm_source=rss&utm_medium=rss&utm_campaign=threat-hunting-with-mitre-attck Mon, 02 Oct 2023 09:09:18 +0000 https://www.itsecurityguru.org/?p=50016 Cybercriminal tactics continue to grow in number and advance in ability; in response, many organisations have seen the need to reach a security posture where their teams can proactively combat threats.   Threat hunting plays a pivotal role in modern organisations’ cybersecurity strategies. It involves actively searching for signs of advanced threats and vulnerabilities beyond […]

The post Threat Hunting with MITRE ATT&CK appeared first on IT Security Guru.

]]>
Cybercriminal tactics continue to grow in number and advance in ability; in response, many organisations have seen the need to reach a security posture where their teams can proactively combat threats.

 

Threat hunting plays a pivotal role in modern organisations’ cybersecurity strategies. It involves actively searching for signs of advanced threats and vulnerabilities beyond passive defence mechanisms. The MITRE ATT&CK Framework is an industry-standard threat hunters can use to proactively ensure they have protection against new and evolving attacks. Automating these processes for threat hunting can advance any security team’s capabilities.

 

However, it can be challenging to integrate or collect security data for effective threat hunting. The number of security technologies often results in fragmented data and hinders a comprehensive threat-hunting approach. Automated threat hunting has become a solution that can advance the capabilities of any security team.

 

Understanding Disparate Security Technologies

Modern organisations employ a variety of security technologies to safeguard their digital assets. These include firewalls, intrusion detection systems, antivirus software, and endpoint protection. While effective, the sheer number of disparate security technologies poses challenges in centralising security data. Each solution generates logs and alerts, creating data silos.

 

The Problem of Non-integrated Security Data

Scattered security data creates several difficulties. Security teams grapple with a deluge of data from diverse sources, making identifying relevant threat indicators and patterns challenging. The absence of comprehensive visibility into potential threats leaves organisations vulnerable to increasingly advanced adversaries, who will exploit these data gaps. Inefficiencies plague threat-hunting processes because analysts must manually correlate data from various sources, slowing response times and increasing the likelihood of missing critical threats.

 

The Concept of Automated Threat Hunting

Automated threat hunting remediates the challenges inherent in integrating disparate security data. Security systems use advanced algorithms to streamline and enhance the threat hunting process. Automated threat hunting empowers security teams to pull security data from different technologies on demand, ensuring they have the right data.

 

Automating the MITRE ATT&CK Framework for Threat Hunting

Organisations should enhance the use of MITRE ATT&CK Frameworks in their threat hunting processes and techniques with automation to free up time and improve detection.

 

Automation #1: Pre-Built Response Playbooks

MITRE ATT&CK provides updated data sets of indicators of compromise (IOC) and techniques, tactics, and procedures (TTPs) that adversaries use. Threat hunters use this data to create procedures and processes around known threats to properly respond. Automation can save this set of procedures as a pre-defined playbook, which can be applied in the future for the same threat. It will also search across all data sources in your security environment for a comprehensive visibility into threats.

 

Automation #2: Collecting the Right Hunt Data

When collecting security data during a hunt, it’s common to collect too much or too little information. Pinpointing the right data saves time and increases hunt accuracy. MITRE ATT&CK frameworks ensure you have the correct data sources by telling you which to collect from logs, security systems, and threat intelligence. Automation allows you to save parameters for data collection of the right sources to apply for future hunts.

 

Automation #3: Penetration Testing/Red Teaming

Cyberattacks and tactics change all the time, and red/blue teaming are great exercises that help you understand where your proactive abilities are and your defence against them. Automation can provide a great lift here by automating simulations of known TTPS from MITRE Frameworks to fine-tune detection and response management.

Advantages of Automating Threat Hunting

Automating threat hunting allows security teams to effortlessly access security data from diverse technologies when needed, streamlining hunting and procedures, while reducing manual effort. Security analysts can swiftly identify suspicious activities and patterns, resulting in quicker threat detection. The accelerated detection and response to security incidents are crucial in today’s threat landscape. Automated threat hunting expedites the identification of threats, enabling organisations to respond promptly and mitigate potential damage.

 

The Role of the Security Operations Platform

A security operations platform offers a wide range of capabilities. It centralises security data from disparate technologies and provides security teams with a unified, real-time view of their environment, thus facilitating improved threat detection and response. An essential aspect of this platform is its ability to query security data from all technologies. This functionality ensures that all artifacts, regardless of their source, are examined, making it an invaluable tool in the hunt for threats.

 

Conclusion

Automating threat hunting via a security operations platform enhances efficiency, augments visibility, and expedites incident response. As we look to the future of cybersecurity, the seamless integration of security data will remain central to effective threat hunting, ensuring that organisations stay ahead of evolving cyber threats.

The post Threat Hunting with MITRE ATT&CK appeared first on IT Security Guru.

]]>